Sciweavers

1051 search results - page 34 / 211
» Secure Continuity for Sensor Networks
Sort
View
CN
2010
90views more  CN 2010»
15 years 2 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
SUTC
2006
IEEE
15 years 8 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
QSHINE
2009
IEEE
15 years 8 months ago
Using Sensor Networks to Measure Intensity in Sporting Activities
The deployment of sensor networks is both widespread and varied with more niche applications based on these networks. In the case study provided in this work, the network is provid...
Mark Roantree, Michael Whelan, Jie Shi, Niall Moyn...
AINA
2008
IEEE
15 years 4 months ago
A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks
Sensor networks usually generate continuous stream of data over time. Clustering sensor data as a core task of mining sensor data plays an essential role in analytical application...
Amirhosein Taherkordi, Reza Mohammadi, Frank Elias...
CORR
2010
Springer
147views Education» more  CORR 2010»
15 years 16 days ago
Cluster based Key Management in Wireless Sensor Networks
—Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clus...
Anvesh Aileni