Sciweavers

1087 search results - page 133 / 218
» Secure Tracking in Sensor Networks
Sort
View
COMCOM
2007
95views more  COMCOM 2007»
14 years 10 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
E4MAS
2005
Springer
15 years 3 months ago
Augmenting the Physical Environment Through Embedded Wireless Technologies
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
IPSN
2003
Springer
15 years 3 months ago
Beyond Average: Toward Sophisticated Sensing with Queries
High-level query languages are an attractive interface for sensor networks, potentially relieving application programmers from the burdens of distributed, embedded programming. In ...
Joseph M. Hellerstein, Wei Hong, Samuel Madden, Ky...
WSNA
2003
ACM
15 years 3 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
CCS
2010
ACM
15 years 4 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...