Sciweavers

1702 search results - page 193 / 341
» Dependability Considerations in Wireless Sensor Networks App...
Sort
View
JIPS
2010
389views more  JIPS 2010»
14 years 10 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
INFOCOM
2011
IEEE
14 years 7 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
MSWIM
2005
ACM
15 years 9 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
COMCOM
2007
136views more  COMCOM 2007»
15 years 4 months ago
Demand-scalable geographic multicasting in wireless sensor networks
In this paper, we focus on the challenge of demand-scalable multicast routing in wireless sensor networks. Due to the ad-hoc nature of the placement of the sensor nodes as well as...
Shibo Wu, K. Selçuk Candan
TMC
2010
224views more  TMC 2010»
15 years 2 months ago
Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme
—This paper focuses on multihop range-free localization in anisotropic wireless sensor networks. In anisotropic networks, geometric distance between a pair of sensor nodes is not...
Qingjun Xiao, Bin Xiao, Jiannong Cao, Jianping Wan...