Sciweavers

247 search results - page 34 / 50
» Efficient anonymity schemes for clustered wireless sensor ne...
Sort
View
PIMRC
2008
IEEE
14 years 4 months ago
Overcoming radio link asymmetry in wireless sensor networks
— We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy effici...
Ren Ping Liu, Zvi Rosberg, Iain B. Collings, Carol...
MOBIHOC
2007
ACM
14 years 10 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
MOBISYS
2006
ACM
14 years 10 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
MSN
2007
Springer
110views Sensor Networks» more  MSN 2007»
14 years 4 months ago
A Location Aided Flooding Protocol for Wireless Ad Hoc Networks
Flooding in wireless ad hoc networks is a fundamental and critical operation in supporting various applications and protocols. However, the traditional flooding scheme generates ex...
Xinxin Liu, Xiaohua Jia, Hai Liu, Li Feng
SSDBM
2008
IEEE
101views Database» more  SSDBM 2008»
14 years 4 months ago
Scalable Ubiquitous Data Access in Clustered Sensor Networks
Wireless sensor networks have drawn much attention due to their ability to monitor ecosystems and wildlife habitats. In such systems, the data should be intelligently collected to ...
Yueh-Hua Lee, Alex Thomo, Kui Wu, Valerie King