Sciweavers

1692 search results - page 21 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 6 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
SASN
2006
ACM
15 years 5 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
LCN
2007
IEEE
15 years 6 months ago
Reliability Control for Aggregation in Wireless Sensor Networks
— Data aggregation is a method used in sensor networks to reduce the amount of messages transported. By aggregating, the data contained in several messages is fused into one sing...
Jonathan P. Benson, Tony O'Donovan, Cormac J. Sree...
GLOBECOM
2008
IEEE
15 years 6 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu