Sciweavers

657 search results - page 87 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
78
Voted
SRDS
2008
IEEE
15 years 4 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
TPDS
2008
196views more  TPDS 2008»
14 years 9 months ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...
MOBIHOC
2008
ACM
15 years 9 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
COLCOM
2007
IEEE
15 years 4 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
ISPA
2005
Springer
15 years 3 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen