Sciweavers

290 search results - page 50 / 58
» A Secure Triple-Key Management Scheme for Wireless Sensor Ne...
Sort
View
TWC
2008
154views more  TWC 2008»
15 years 5 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
147
Voted
INTERSENSE
2006
ACM
15 years 11 months ago
Programming wireless sensor networks with logical neighborhoods
— Wireless sensor network (WSN) architectures often feature a (single) base station in charge of coordinating the application functionality. Although this assumption simplified ...
Luca Mottola, Gian Pietro Picco
INFOCOM
2006
IEEE
15 years 11 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
ITNG
2008
IEEE
15 years 11 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
FBIT
2007
IEEE
15 years 11 months ago
Adaptive Data Dissemination in Sensor Networks Using WPDD
In Wireless Sensor Networks (WSNs), address-based routing approaches often lead to severe problems due to node mobility, energy-saving sleep-cycles, and often missing or unreliabl...
Falko Dressler, Reinhard German, Bettina Krüg...