Sciweavers

394 search results - page 60 / 79
» Efficient and Robust Secure Aggregation for Sensor Networks
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 2 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 6 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
ATAL
2006
Springer
13 years 11 months ago
Scalable and reliable data delivery in mobile ad hoc sensor networks
This paper studies scalable data delivery algorithms in mobile ad hoc sensor networks with node and link failures. Many algorithms have been developed for data delivery and fusion...
Bin Yu, Paul Scerri, Katia P. Sycara, Yang Xu, Mic...
PERCOM
2009
ACM
14 years 2 months ago
Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks
—This paper addresses the problem of providing congestion-management for a shared wireless sensor networkbased target tracking system. In many large-scale wireless sensor network...
Lei Chen 0005, Boleslaw K. Szymanski, Joel W. Bran...
SIGMOD
2007
ACM
168views Database» more  SIGMOD 2007»
14 years 7 months ago
In-network execution of monitoring queries in sensor networks
Sensor networks are widely used in many applications for collecting information from the physical environment. In these applications, it is usually necessary to track the relation...
Xiaoyan Yang, Hock-Beng Lim, M. Tamer Özsu, K...