Sciweavers

3971 search results - page 40 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
EWSN
2004
Springer
14 years 7 months ago
Power Sources for Wireless Sensor Networks
Shad Roundy, Dan Steingart, Luc Frechette, Paul K....
JIPS
2010
389views more  JIPS 2010»
13 years 2 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
EWSN
2009
Springer
14 years 8 months ago
Cooperative Intrusion Detection in Wireless Sensor Networks
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
CCS
2007
ACM
14 years 1 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
IPSN
2005
Springer
14 years 1 months ago
Eco: an ultra-compact low-power wireless sensor node for real-time motion monitoring
Eco is an ultra-compact wireless sensor node. Only 648 mm3 in
Chulsung Park, Jinfeng Liu, Pai H. Chou