Sciweavers

657 search results - page 12 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
84
Voted
JNW
2008
126views more  JNW 2008»
14 years 9 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
76
Voted
VTC
2010
IEEE
172views Communications» more  VTC 2010»
14 years 8 months ago
A Cumulant-Based Characterization of the Aggregate Interference Power in Wireless Networks
— The importance of characterizing the aggregate interference power generated by a wireless network has increased with the emergence of different types of wireless networks such ...
Muhammad Aljuaid, Halim Yanikomeroglu
81
Voted
CCS
2006
ACM
15 years 1 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
IDEAS
2006
IEEE
180views Database» more  IDEAS 2006»
15 years 3 months ago
SURCH: Distributed Aggregation over Wireless Sensor Networks
In this paper, we present SURCH, a novel decentralized algorithm for efficient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubraman...