Sciweavers

2099 search results - page 213 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
MOBISYS
2003
ACM
15 years 10 months ago
An Entity Maintenance and Connection Service for Sensor Networks
In this paper, we present a middleware architecture for coordination services in sensor networks that facilitates interaction between groups of sensors which monitor different env...
Brian M. Blum, Prashant Nagaraddi, Anthony D. Wood...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 2 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
INFOCOM
2007
IEEE
15 years 5 months ago
Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks
—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use re...
Qing Cao, Tarek F. Abdelzaher, Tian He, Robin Krav...
MMNS
2003
199views Multimedia» more  MMNS 2003»
15 years 2 days ago
BeanWatcher: A Tool to Generate Multimedia Monitoring Applications for Wireless Sensor Networks
In this paper we present a new tool called BeanWatcher that allows the semi-automatic generation of multimedia monitoring and management applications for wireless sensor networks. ...
André Lins, Eduardo Freire Nakamura, Antoni...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 2 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni