Sciweavers

478 search results - page 40 / 96
» Forward-Secure Key Evolution in Wireless Sensor Networks
Sort
View
ICDCS
2007
IEEE
15 years 4 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
PEWASUN
2005
ACM
15 years 3 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
JSAC
2010
91views more  JSAC 2010»
14 years 8 months ago
Constructing low-connectivity and full-coverage three dimensional sensor networks
Abstract—Low-connectivity and full-coverage three dimensional Wireless Sensor Networks (WSNs) have many real-world applications. By low connectivity, we mean there are at least k...
Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, W...
ICCSA
2009
Springer
15 years 4 months ago
A Capacity Aware Data Transport Protocol for Wireless Sensor Network
Wireless link capacity within a sensor network has direct impact on its performance and throughput. Due to dense sensor deployment, interference seems to be a key factor for varyin...
Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choo...
IEEECIT
2010
IEEE
14 years 8 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang