Sciweavers

657 search results - page 74 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
COMCOM
2006
168views more  COMCOM 2006»
14 years 9 months ago
Relay node placement in large scale wireless sensor networks
Scalability and extended lifetime are two critical design goals of any large scale wireless sensor network. A two-tiered network model has been proposed recently for this purpose....
Jian Tang, Bin Hao, Arunabha Sen
BROADNETS
2006
IEEE
15 years 3 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
HICSS
2005
IEEE
185views Biometrics» more  HICSS 2005»
15 years 3 months ago
HEAR-SN: A New Hierarchical Energy-Aware Routing Protocol for Sensor Networks
Wireless sensor networks are becoming an integral part of numerous applications very quickly. Here, we present a new approach for sensor applications that requires coverage for a ...
Michael Hempel, Hamid Sharif, Prasad Raviraj
ESAS
2005
Springer
15 years 3 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
AINA
2009
IEEE
15 years 7 days ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga