Sciweavers

914 search results - page 67 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
DCOSS
2011
Springer
12 years 7 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...
IPCCC
2006
IEEE
14 years 1 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
ISCAS
2007
IEEE
149views Hardware» more  ISCAS 2007»
14 years 2 months ago
Address-Event Video Streaming over Wireless Sensor Networks
Abstract— We explore an algorithm and methodology for realtime video compression and communication over sensor network. Video is encoded using the address-event representation (A...
Eugenio Culurciello, Joon Hyuk Park, Andreas Savvi...
ALGOSENSORS
2010
Springer
13 years 6 months ago
Monitoring Churn in Wireless Networks
Wireless networks often experience a significant amount of churn, the arrival and departure of nodes. In this paper we propose a distributed algorithm for single-hop networks that...
Stephan Holzer, Yvonne Anne Pignolet, Jasmin Smula...
IJSN
2006
116views more  IJSN 2006»
13 years 7 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...