Sciweavers

914 search results - page 49 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WINET
2010
199views more  WINET 2010»
13 years 6 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 2 months ago
Providing Transparent Security Services to Sensor Networks
— In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our key management module facilitating an efficient...
Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitr...
EVOW
2009
Springer
13 years 12 months ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
GISCIENCE
2010
Springer
231views GIS» more  GISCIENCE 2010»
13 years 9 months ago
Efficient Data Collection and Event Boundary Detection in Wireless Sensor Networks Using Tiny Models
Using wireless geosensor networks (WGSN), sensor nodes often monitor a phenomenon that is both continuous in time and space. However, sensor nodes take discrete samples, and an ana...
Kraig King, Silvia Nittel
SECON
2008
IEEE
14 years 2 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao