Sciweavers

186 search results - page 27 / 38
» Provenance-Aware Sensor Data Storage
Sort
View
95
Voted
CCS
2010
ACM
15 years 6 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
INFOCOM
2005
IEEE
15 years 5 months ago
BARD: Bayesian-assisted resource discovery in sensor networks
Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the mos...
Fred Stann, John S. Heidemann
ADHOCNOW
2006
Springer
15 years 5 months ago
File System Support for Adjustable Resolution Applications in Sensor Networks
Flash memory is often the technology of choice for sensor networks because of its cost-effectiveness and attractive energy properties. In storage-constrained sensor network applica...
Vikram P. Munishwar, Sameer Tilak, Nael B. Abu-Gha...
87
Voted
ICDCSW
2005
IEEE
15 years 5 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
SENSYS
2003
ACM
15 years 4 months ago
On the effect of localization errors on geographic face routing in sensor networks
In the absence of location errors, geographic routing - using a combination of greedy forwarding and face routing - has been shown to work correctly and efficiently. The effects o...
Karim Seada, Ahmed Helmy, Ramesh Govindan