Sciweavers

154 search results - page 4 / 31
» Analyzing and modeling encryption overhead for sensor networ...
Sort
View
ICC
2007
IEEE
254views Communications» more  ICC 2007»
13 years 11 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
IPSN
2004
Springer
14 years 1 months ago
Distributed particle filters for sensor networks
Abstract. This paper describes two methodologies for performing distributed particle filtering in a sensor network. It considers the scenario in which a set of sensor nodes make m...
Mark Coates
RTAS
2005
IEEE
14 years 1 months ago
Timing Analysis for Sensor Network Nodes of the Atmega Processor Family
Low-end embedded architectures, such as sensor nodes, have become popular in diverse fields, many of which impose real-time constraints. Currently, the Atmel Atmega processor fam...
Sibin Mohan, Frank Mueller, David B. Whalley, Chri...
ITNG
2008
IEEE
14 years 2 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang