Sciweavers

82 search results - page 9 / 17
» Efficient sensor node authentication via 3GPP mobile communi...
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 3 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
DCOSS
2006
Springer
14 years 20 days ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama
LCN
2005
IEEE
14 years 2 months ago
Data Dissemination based on Mobile Agent in Wireless Sensor Networks
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks [1-6]. In the traditional client/server-based computing architecture, data at multip...
Min Chen, Taekyoung Kwon, Yanghee Choi
COMCOM
2007
95views more  COMCOM 2007»
13 years 9 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...