Sciweavers

914 search results - page 38 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
AINA
2007
IEEE
15 years 6 months ago
An Efficient Scheme for User Authentication in Wireless Sensor Networks
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified i...
Canming Jiang, Bao Li, Haixia Xu
TMC
2010
210views more  TMC 2010»
14 years 10 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
IPSN
2010
Springer
15 years 6 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
BSN
2009
IEEE
157views Sensor Networks» more  BSN 2009»
15 years 4 months ago
Towards Self-Healing in Wireless Sensor Networks
— Faults in WSN are very common and appear in different levels of the system. For pervasive applications to be adopted by end-users there is a need for autonomic selfhealing. Thi...
Themistoklis Bourdenas, Morris Sloman
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 6 months ago
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment
—In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effe...
Mohammed W. Baidas, Ahmed S. Ibrahim, Karim G. Sed...