Sciweavers

688 search results - page 18 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
155
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ESAS
2004
Springer
15 years 10 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
APNOMS
2006
Springer
15 years 8 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
ICOIN
2007
Springer
15 years 11 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
TSP
2010
14 years 11 months ago
Decentralized sparse signal recovery for compressive sleeping wireless sensor networks
Abstract--This paper develops an optimal decentralized algorithm for sparse signal recovery and demonstrates its application in monitoring localized phenomena using energy-constrai...
Qing Ling, Zhi Tian