Sciweavers

1423 search results - page 146 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 7 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
163
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
SASN
2006
ACM
15 years 10 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
ADHOCNETS
2009
Springer
15 years 10 months ago
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Anna Förster, Alexander Förster, Amy L. ...
128
Voted
GLOBECOM
2010
IEEE
15 years 2 months ago
Feasibility and Benefits of Passive RFID Wake-Up Radios for Wireless Sensor Networks
Energy efficiency is one of the crucial design criteria for wireless sensor networks. Idle listening constitutes a major part of energy waste, and thus solutions such as duty cycli...
He Ba, Ilker Demirkol, Wendi Rabiner Heinzelman