Sciweavers

435 search results - page 33 / 87
» Group-based key pre-distribution in wireless sensor networks
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
MASCOTS
2008
13 years 9 months ago
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks
Lifetime of a wireless sensor network is affected by key factors such as network architecture, network size, sensor node population model, data generation rate, initial battery bu...
Carol Fung, Yanni Ellen Liu
CCS
2006
ACM
13 years 11 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
SENSYS
2003
ACM
14 years 24 days ago
TOSSIM: accurate and scalable simulation of entire tinyOS applications
Accurate and scalable simulation has historically been a key enabling factor for systems research. We present TOSSIM, a simulator for TinyOS wireless sensor networks. By exploitin...
Philip Levis, Nelson Lee, Matt Welsh, David E. Cul...