Sciweavers

657 search results - page 62 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
ICDCS
2007
IEEE
15 years 4 months ago
Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and produc...
Yunhao Liu, Mo Li
IEEEIA
2009
14 years 7 months ago
Agent Based Multipath Routing in Wireless Sensor Networks
recently, mobile agents have been used to solve many problems in wireless sensor networks. Agents are usually transferred from a node to another to aggregate the sensed data and si...
Rabie A. Ramadan
DCOSS
2009
Springer
15 years 4 months ago
Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proposed for a large variety of applications. As the number of applications of sensor networks continue to grow, the number of users in se...
Hui Ling, Taieb Znati
MASS
2010
110views Communications» more  MASS 2010»
14 years 7 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
INFOCOM
2006
IEEE
15 years 3 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya