Sciweavers

868 search results - page 89 / 174
» Key Management in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 6 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
15 years 3 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
MASS
2010
156views Communications» more  MASS 2010»
14 years 9 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
IPSN
2007
Springer
15 years 6 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda
IPSN
2007
Springer
15 years 6 months ago
The RETOS operating system: kernel, tools and applications
This demonstration shows the programming development suite of the RETOS operating system for sensor networks, which provides a robust and multithreaded programming interface to ap...
Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim, ...