Sciweavers

247 search results - page 21 / 50
» Protecting Receiver-Location Privacy in Wireless Sensor Netw...
Sort
View
129
Voted
ESORICS
2004
Springer
15 years 7 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
JSAC
2010
172views more  JSAC 2010»
15 years 8 days ago
Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks
—Wireless Multimedia Sensor Networks (WMSNs) are distributed systems of wirelessly networked devices that allow retrieving video and audio streams, still images, and scalar senso...
Tommaso Melodia, Ian F. Akyildiz
128
Voted
TDSC
2008
121views more  TDSC 2008»
15 years 1 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
PERCOM
2004
ACM
16 years 1 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
IPCCC
2007
IEEE
15 years 8 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong