Sciweavers

914 search results - page 64 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
COMCOM
2006
79views more  COMCOM 2006»
13 years 8 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
TSP
2008
131views more  TSP 2008»
13 years 7 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
INFOCOM
2007
IEEE
14 years 2 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...
ALGOSENSORS
2004
Springer
14 years 1 months ago
On the Computational Complexity of Sensor Network Localization
Determining the positions of the sensor nodes in a network is essential to many network functionalities such as routing, coverage and tracking, and event detection. The localizatio...
James Aspnes, David Kiyoshi Goldenberg, Yang Richa...