Sciweavers

914 search results - page 38 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
AINA
2007
IEEE
14 years 2 months ago
An Efficient Scheme for User Authentication in Wireless Sensor Networks
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified i...
Canming Jiang, Bao Li, Haixia Xu
TMC
2010
210views more  TMC 2010»
13 years 6 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
IPSN
2010
Springer
14 years 2 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
BSN
2009
IEEE
157views Sensor Networks» more  BSN 2009»
14 years 1 months ago
Towards Self-Healing in Wireless Sensor Networks
— Faults in WSN are very common and appear in different levels of the system. For pervasive applications to be adopted by end-users there is a need for autonomic selfhealing. Thi...
Themistoklis Bourdenas, Morris Sloman
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment
—In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effe...
Mohammed W. Baidas, Ahmed S. Ibrahim, Karim G. Sed...