Sciweavers

1051 search results - page 62 / 211
» Secure Continuity for Sensor Networks
Sort
View
INFOCOM
2006
IEEE
15 years 9 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
ACSAC
2006
IEEE
15 years 9 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
IPSN
2005
Springer
15 years 8 months ago
QoM and lifetime-constrained random deployment of sensor networks for minimum energy consumption
— We consider the problem of energy efficient random deployment of sensor network. Our goal is to find the sensor node density, or alternatively, the energy resource density at e...
Morteza Maleki, Massoud Pedram
SENSYS
2010
ACM
15 years 26 days ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
COMSWARE
2008
IEEE
15 years 9 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri