Sciweavers

297 search results - page 34 / 60
» Distributed Pairwise Key Establishment in Wireless Sensor Ne...
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
BROADNETS
2006
IEEE
14 years 1 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
IJSNET
2006
106views more  IJSNET 2006»
13 years 7 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
AINA
2004
IEEE
13 years 11 months ago
ZBP: A Zone-based Broadcasting Protocol for Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential fun...
Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee
IJSNET
2006
92views more  IJSNET 2006»
13 years 7 months ago
TTS: a two-tiered scheduling mechanism for energy conservation in wireless sensor networks
: In this paper, we present a two-tiered scheduling approach for effective energy conservation in wireless sensor networks. The effectiveness of this mechanism relies on dynamicall...
Nurcan Tezcan, Wenye Wang