Sciweavers

914 search results - page 101 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
15 years 7 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
ISPDC
2010
IEEE
15 years 1 months ago
A Distributed Wakening Based Target Tracking Protocol for Wireless Sensor Networks
We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA) [12] partitions the network into c...
Aysegul Alaybeyoglu, Orhan Dagdeviren, Aylin Kanta...
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
15 years 4 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
148
Voted
UCS
2007
Springer
15 years 10 months ago
D-FLER - A Distributed Fuzzy Logic Engine for Rule-Based Wireless Sensor Networks
Abstract. We propose D-FLER, a distributed, general-purpose reasoning engine for WSN. D-FLER uses fuzzy logic for fusing individual and neighborhood observations, in order to produ...
Mihai Marin-Perianu, Paul J. M. Havinga
MASS
2010
156views Communications» more  MASS 2010»
15 years 1 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov