Sciweavers

2099 search results - page 190 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
ISCAS
2005
IEEE
144views Hardware» more  ISCAS 2005»
15 years 4 months ago
Event-based imaging with active illumination in sensor networks
— We discuss a distributed imaging architecture with active illumination for sensor network applications. An event-based CMOS imager is employed at the sensor level, to convert l...
Eugenio Culurciello, Thiago Teixeira, Andreas G. A...
PERCOM
2005
ACM
15 years 10 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
ADHOC
2008
146views more  ADHOC 2008»
14 years 10 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
ADHOCNOW
2007
Springer
15 years 4 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
INFOCOM
2010
IEEE
14 years 9 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...