Sciweavers

914 search results - page 101 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
13 years 11 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
ISPDC
2010
IEEE
13 years 5 months ago
A Distributed Wakening Based Target Tracking Protocol for Wireless Sensor Networks
We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA) [12] partitions the network into c...
Aysegul Alaybeyoglu, Orhan Dagdeviren, Aylin Kanta...
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
UCS
2007
Springer
14 years 1 months ago
D-FLER - A Distributed Fuzzy Logic Engine for Rule-Based Wireless Sensor Networks
Abstract. We propose D-FLER, a distributed, general-purpose reasoning engine for WSN. D-FLER uses fuzzy logic for fusing individual and neighborhood observations, in order to produ...
Mihai Marin-Perianu, Paul J. M. Havinga
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov