Sciweavers

1096 search results - page 104 / 220
» Gathering-Load-Balanced Tree Protocol for Wireless Sensor Ne...
Sort
View
PERCOM
2011
ACM
14 years 7 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
LCN
2003
IEEE
15 years 9 months ago
Utilizing Solar Power in Wireless Sensor Networks
Sensor networks are designed especially for deployment in adverse and nonaccessible areas without a fixed infrastructure. Therefore, energy conservation plays a crucial role for t...
Thiemo Voigt, Hartmut Ritter, Jochen H. Schiller
ESAS
2007
Springer
15 years 10 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 10 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
IJSN
2006
140views more  IJSN 2006»
15 years 3 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi