Sciweavers

914 search results - page 33 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WISEC
2010
ACM
14 years 25 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
WICOMM
2011
13 years 2 months ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
MOBICOM
2009
ACM
14 years 2 months ago
Data fusion improves the coverage of wireless sensor networks
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
Guoliang Xing, Rui Tan, Benyuan Liu, Jianping Wang...
ICDCS
2007
IEEE
13 years 12 months ago
uSense: A Unified Asymmetric Sensing Coverage Architecture for Wireless Sensor Networks
As a key approach to achieve energy efficiency in sensor networks, sensing coverage has been studied extensively. Researchers have designed many coverage protocols to provide vario...
Yu Gu, Joengmin Hwang, Tian He, David Hung-Chang D...
INFOCOM
2002
IEEE
14 years 28 days ago
Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments
— A key challenge in ad-hoc, data-gathering wireless sensor networks is achieving a lifetime of several years using nodes that carry merely hundreds of joules of stored energy. I...
Manish Bhardwaj, Anantha Chandrakasan