Sciweavers

1423 search results - page 156 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
84
Voted
MSN
2007
Springer
151views Sensor Networks» more  MSN 2007»
15 years 4 months ago
Applications and Performances of Extended TTDDs in Large-Scale Wireless Sensor Networks
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD ...
Hong Zhou, Lu Jin, Zhongwei Zhang, Hesham H. Ali, ...
75
Voted
PERCOM
2008
ACM
15 years 9 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
TMC
2010
210views more  TMC 2010»
14 years 8 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
IFIP
2001
Springer
15 years 2 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
IPSN
2010
Springer
15 years 4 months ago
Programming storage-centric sensor networks with Squirrel
We present SQUIRREL, a stream-oriented programming framework for storage-centric sensor networks. The storagecentric paradigm—where storage operations prevail over communication...
Luca Mottola