Sciweavers

1091 search results - page 8 / 219
» Infrastructure-Establishment from Scratch in Wireless Sensor...
Sort
View
JNW
2008
126views more  JNW 2008»
14 years 11 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
COMCOM
2007
136views more  COMCOM 2007»
14 years 11 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
ESAS
2007
Springer
15 years 3 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ENTCS
2007
95views more  ENTCS 2007»
14 years 11 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
IAT
2010
IEEE
14 years 9 months ago
An Organizational Design for Adaptive Sensor Networks
As wireless sensor network applications grow in complexity, ad-hoc techniques are no longer adequate. Thus, it is crucial that these systems be adaptive and autonomous to remain f...
Walamitien H. Oyenan, Scott A. DeLoach, Gurdip Sin...