Sciweavers

1087 search results - page 64 / 218
» Secure Tracking in Sensor Networks
Sort
View
COMCOM
2007
142views more  COMCOM 2007»
14 years 10 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...
ESAS
2007
Springer
15 years 4 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
CCS
2006
ACM
15 years 1 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
EUC
2005
Springer
15 years 3 months ago
Dynamic Resource Discovery for Sensor Networks
As sensor networks mature the current generation of sensor networks that are application-specific and exposed only to a limited set of users will give way to heterogeneous sensor ...
Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, ...
69
Voted
JSAC
2006
127views more  JSAC 2006»
14 years 10 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang