Sciweavers

657 search results - page 52 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 8 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
SENSYS
2010
ACM
14 years 11 months ago
Practical 3D geographic routing for wireless sensor networks
Geographic routing is of interest for sensor networks because a point-to-point primitive is an important building block for data-centric applications. While there is a significant...
Jiangwei Zhou, Yu Chen, Ben Leong, Pratibha Sundar...
CCS
2006
ACM
15 years 5 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
LCN
2008
IEEE
15 years 8 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
138
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 8 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...