Sciweavers

1692 search results - page 92 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
TPDS
2010
99views more  TPDS 2010»
14 years 10 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
INFOCOM
2007
IEEE
15 years 6 months ago
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use re...
Qing Cao, Tarek F. Abdelzaher, Tian He, Robin Krav...
AINA
2009
IEEE
15 years 5 months ago
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol
—Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service di...
Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjo...
ATAL
2004
Springer
15 years 5 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
PERCOM
2005
ACM
15 years 11 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...