Sciweavers

736 search results - page 83 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
IJSN
2006
116views more  IJSN 2006»
14 years 9 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
IPSN
2005
Springer
15 years 3 months ago
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
— Sensor networks pose security and privacy challenges. One challenge is how to bootstrap secure communications among nodes. Several key pre-distribution schemes have been propos...
Zhen Yu, Yong Guan
ADHOC
2007
130views more  ADHOC 2007»
14 years 10 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic
ISCAS
2005
IEEE
144views Hardware» more  ISCAS 2005»
15 years 3 months ago
Event-based imaging with active illumination in sensor networks
— We discuss a distributed imaging architecture with active illumination for sensor network applications. An event-based CMOS imager is employed at the sensor level, to convert l...
Eugenio Culurciello, Thiago Teixeira, Andreas G. A...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 4 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang