Sciweavers

1051 search results - page 32 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICDCS
2011
IEEE
14 years 1 months ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
INFOCOM
2009
IEEE
15 years 8 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
174
Voted
TWC
2011
417views more  TWC 2011»
14 years 8 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang
IJSN
2007
120views more  IJSN 2007»
15 years 1 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
MOBIHOC
2006
ACM
16 years 1 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao