Sciweavers

1692 search results - page 24 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CN
2006
191views more  CN 2006»
14 years 11 months ago
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Most fault-tolerant schemes for wireless sensor networks focus on power failures or crash faults. Little attention has been paid to the data inconsistency failures which occur whe...
Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Ji...
DSN
2005
IEEE
15 years 5 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
MOBIHOC
2005
ACM
15 years 11 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
MOBIHOC
2004
ACM
15 years 11 months ago
Latency of wireless sensor networks with uncoordinated power saving mechanisms
Olivier Dousse, Petteri Mannersalo, Patrick Thiran
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 6 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee