Sciweavers

3426 search results - page 300 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
CN
2010
90views more  CN 2010»
15 years 5 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
156
Voted
IJSN
2006
140views more  IJSN 2006»
15 years 4 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
163
Voted
JCP
2008
201views more  JCP 2008»
15 years 4 months ago
A Distributed AOA Based Localization Algorithm for Wireless Sensor Networks
In this paper we propose a distributed algorithm for solving the positioning problem in ad-hoc wireless networks. The method is based on the capability of the nodes to measure the ...
Gabriele Di Stefano, Alberto Petricola
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 11 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga
151
Voted
TON
2010
173views more  TON 2010»
15 years 3 months ago
Minimizing delay and maximizing lifetime for wireless sensor networks with anycast
—In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks, for which events occur infrequently. In such syste...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...