Sciweavers

914 search results - page 41 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
MIDDLEWARE
2005
Springer
14 years 1 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 2 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
PERCOM
2004
ACM
14 years 7 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
WISEC
2009
ACM
14 years 2 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
ADHOC
2005
125views more  ADHOC 2005»
13 years 8 months ago
Security considerations in ad hoc sensor networks
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Fei Hu, Neeraj K. Sharma