Sciweavers

914 search results - page 44 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
JPDC
2006
129views more  JPDC 2006»
13 years 8 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
TELSYS
2010
174views more  TELSYS 2010»
13 years 2 months ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
GLOBECOM
2010
IEEE
13 years 6 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
EUC
2007
Springer
13 years 12 months ago
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing
A Wireless Sensor Network (WSN) composed of tiny sensor nodes may operate in an unfavorable terrain. The coupling of inherent limitations and harsh environments makes WSNs fallible...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
FTDCS
2004
IEEE
13 years 11 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis