Sciweavers

914 search results - page 4 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
151
Voted
CORR
2008
Springer
181views Education» more  CORR 2008»
15 years 3 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
134
Voted
TWC
2008
156views more  TWC 2008»
15 years 3 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
ADHOCNETS
2009
Springer
15 years 10 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
111
Voted
ESAS
2004
Springer
15 years 7 months ago
Key Management in Wireless Sensor Networks
Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin W...
160
Voted
CN
2004
256views more  CN 2004»
15 years 3 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...