Sciweavers

3426 search results - page 97 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
WISEC
2010
ACM
15 years 8 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
ISCC
2006
IEEE
15 years 9 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
170
Voted
WCE
2007
15 years 4 months ago
A Distributed Energy Efficient Query Processing in Self-Organized Wireless Sensor Networks
—Spatial query execution is an essential functionality of a sensor network. Redundancy within a sensor network can be exploited to reduce the communication cost incurred in execu...
Meer A. Hamza, Sherin M. Youssef, Salma F. Fayed
154
Voted
IPCCC
2005
IEEE
15 years 9 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
113
Voted
CNSR
2008
IEEE
151views Communications» more  CNSR 2008»
15 years 10 months ago
Discrete Model to Estimate Lifetime of a Wireless Sensor Network for Audio Storage
— Wireless sensor networks (WSNs) can be used to record and store audio data at remote and inaccessible places. However, audio data adds an additional concern to the design of th...
Sajid Hussain, Patrick Drane, Michael Mallinson