Sciweavers

657 search results - page 96 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
ISCC
2009
IEEE
159views Communications» more  ISCC 2009»
15 years 4 months ago
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Abstract— The fluctuations of the price of crude oil is pushing the oil companies to increase the investments in seismic exploration of new oil and gas reservoir. Seismic explor...
Stefano Savazzi, Umberto Spagnolini
MOBISYS
2006
ACM
15 years 9 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
TIFS
2008
208views more  TIFS 2008»
14 years 9 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
IJSN
2008
145views more  IJSN 2008»
14 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
INFOCOM
2007
IEEE
15 years 4 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim