Sciweavers

914 search results - page 76 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ICCSA
2009
Springer
14 years 2 months ago
A Capacity Aware Data Transport Protocol for Wireless Sensor Network
Wireless link capacity within a sensor network has direct impact on its performance and throughput. Due to dense sensor deployment, interference seems to be a key factor for varyin...
Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choo...
IEEECIT
2010
IEEE
13 years 6 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang
DMSN
2008
ACM
13 years 9 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
SASN
2006
ACM
14 years 1 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
IWCMC
2009
ACM
14 years 2 months ago
Optimal cooperative spectrum sensing in cognitive sensor networks
This paper addresses the problem of optimal cooperative spectrum sensing in a cognitive-enabled sensor network where cognitive sensors can cooperate in the sensing of the spectrum...
Hai Ngoc Pham, Yan Zhang, Paal E. Engelstad, Tor S...