Sciweavers

1051 search results - page 37 / 211
» Secure Continuity for Sensor Networks
Sort
View
SENSYS
2005
ACM
15 years 7 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
112
Voted
SICHERHEIT
2010
14 years 11 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
DEXAW
2006
IEEE
122views Database» more  DEXAW 2006»
15 years 8 months ago
Agent-Based Petroleum Offshore Monitoring Using Sensor Networks
This paper investigates the architecture and design of agent-based sensor networks for petroleum offshore monitoring. A few challenges to monitor the reservoir, wellbore and wellh...
Sajid Hussain, Md. Rafiqul Islam, Elhadi Shakshuki...
BROADNETS
2006
IEEE
15 years 8 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
MOBIHOC
2009
ACM
16 years 2 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang