Sciweavers

346 search results - page 48 / 70
» An Efficient Scheme for User Authentication in Wireless Sens...
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
COMCOM
2007
95views more  COMCOM 2007»
13 years 9 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
ISCIS
2004
Springer
14 years 2 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
ITIIS
2010
151views more  ITIIS 2010»
13 years 7 months ago
Practical Data Transmission in Cluster-Based Sensor Networks
Data routing in wireless sensor networks must be energy-efficient because tiny sensor nodes have limited power. A cluster-based hierarchical routing is known to be more efficient ...
Dae Young Kim, Jinsung Cho, Byeong-Soo Jeong
SENSYS
2003
ACM
14 years 2 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal