Sciweavers

5815 search results - page 829 / 1163
» Self-monitoring for sensor networks
Sort
View
CN
2007
71views more  CN 2007»
15 years 1 months ago
Medium access control in wireless sensor networks
Kurtis B. Kredo II, Prasant Mohapatra
COMCOM
2007
72views more  COMCOM 2007»
15 years 1 months ago
Trust-based security for wireless ad hoc and sensor networks
Azzedine Boukerche, Li Xu, Khalil El-Khatib
ITIIS
2008
153views more  ITIIS 2008»
15 years 1 months ago
Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks
In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduc...
Abedelaziz Mohaisen, DaeHun Nyang, Tamer AbuHmed
JCM
2008
69views more  JCM 2008»
15 years 1 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen