Sciweavers

251 search results - page 15 / 51
» A Node Recovery Scheme for Data Dissemination in Wireless Se...
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
INFOCOM
2011
IEEE
13 years 8 hour ago
SelectCast: Scalable data aggregation scheme in wireless sensor networks
—In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density λ ∈ [1, n], we study the tradeoffs between the aggregation throughput and gat...
Cheng Wang, ShaoJie Tang, Xiang-Yang Li, Changjun ...
VTC
2007
IEEE
159views Communications» more  VTC 2007»
14 years 2 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
COMCOM
2007
95views more  COMCOM 2007»
13 years 8 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
IJSNET
2006
106views more  IJSNET 2006»
13 years 8 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue