Sciweavers

2282 search results - page 90 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 10 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
SENSYS
2005
ACM
15 years 10 months ago
Algorithms for generic role assignment in wireless sensor networks
We consider configuration of wireless sensor networks, where certain functions must be automatically assigned to sensor nodes, such that the properties of a sensor node (e.g., rem...
Christian Frank, Kay Römer
CORR
2008
Springer
181views Education» more  CORR 2008»
15 years 4 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
INFOCOM
2009
IEEE
15 years 11 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
ISCC
2006
IEEE
123views Communications» more  ISCC 2006»
15 years 10 months ago
WISENEP: A Network Processor for Wireless Sensor Networks
Abstract— Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful l...
Andre Mota, Leonardo B. Oliveira, Felipe F. Rocha,...