Sciweavers

1051 search results - page 43 / 211
» Secure Continuity for Sensor Networks
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
NCA
2006
IEEE
15 years 8 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
ALGOSENSORS
2004
Springer
15 years 7 months ago
Constrained Flow Optimization with Applications to Data Gathering in Sensor Networks
We focus on data gathering problems in energy-constrained wireless sensor networks. We study store-and-gather problems where data are locally stored on the sensors before the data ...
Bo Hong, Viktor K. Prasanna
SASN
2003
ACM
15 years 7 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
COMCOM
2007
142views more  COMCOM 2007»
15 years 1 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...