Sciweavers

1692 search results - page 27 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
WISTP
2007
Springer
15 years 5 months ago
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
Nicolas Fournel, Marine Minier, Stéphane Ub...
NAS
2010
IEEE
14 years 10 months ago
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, et...
Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zh...
WINET
2002
101views more  WINET 2002»
14 years 11 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
MOBIHOC
2009
ACM
16 years 9 days ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
SASN
2004
ACM
15 years 5 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim