Sciweavers

1692 search results - page 15 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ISCIS
2004
Springer
15 years 5 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
CCS
2003
ACM
15 years 3 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
NPC
2004
Springer
15 years 5 months ago
Accurate Emulation of Wireless Sensor Networks
Abstract. Wireless sensor networks (WSNs) have a wide range of useful, datacentric applications, and major techniques involved in these applications include in-network query proces...
Hejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lion...
APNOMS
2007
Springer
15 years 3 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...