Sciweavers

868 search results - page 63 / 174
» Key Management in Wireless Sensor Networks
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 1 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
MONET
2006
173views more  MONET 2006»
15 years 1 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
ATAL
2005
Springer
15 years 7 months ago
Intelligent agents for wireless sensor networks
Interpolation is a technique used to estimate the value of a function at a given location, assuming that the values of the function are known for surrounding locations. A Wireless...
Richard Tynan, David Marsh, Donal O'Kane, Gregory ...
SENSYS
2005
ACM
15 years 7 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
WSNA
2003
ACM
15 years 6 months ago
Role-based hierarchical self organization for wireless ad hoc sensor networks
Efficiently self organizing a network hierarchy with specific assignment of roles (or tasks) to sensors based on their physical wireless connectivity and sensing characteristics ...
Manish Kochhal, Loren Schwiebert, Sandeep K. S. Gu...