Sciweavers

4189 search results - page 605 / 838
» On the Security of Wireless Sensor Networks
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 11 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
66
Voted
JSAC
2010
84views more  JSAC 2010»
14 years 9 months ago
A little feedback can simplify sensor network cooperation
—Shannon’s discovery of digital communication has shaped the architecture of virtually all communication systems in use today. The digital communication paradigm is built aroun...
Anand D. Sarwate, Michael Gastpar
TWC
2010
14 years 5 months ago
Distributed Routing Algorithms for Underwater Acoustic Sensor Networks
Underwater Acoustic Sensor Networks (UW-ASNs) consist of devices with sensing, processing, and communication capabilities that are deployed underwater to perform collaborative moni...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
IPSN
2005
Springer
15 years 4 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
SAC
2009
ACM
15 years 5 months ago
Geographical data collection in sensor networks with self-organizing transaction cluster-heads
This paper proposes 2G, a flexible and energy-efficient data collection protocol for sensor networks for increasing network lifetime. To this end, it integrates self-organizing d...
Neeraj Rajgure, Eric Platon, Cristian Borcea, Shin...