Sciweavers

1487 search results - page 63 / 298
» Information assurance in sensor networks
Sort
View
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 7 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
14 years 1 months ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache
MOBIHOC
2007
ACM
14 years 8 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
INFOCOM
2003
IEEE
14 years 2 months ago
Sensor-Centric Quality of Routing in Sensor Networks
Abstract— Standard embeded sensor nework models emphasize energy efficiency and distributed decision-making by considering untethered and unattended sensors. To this we add two ...
Rajgopal Kannan, Sudipta Sarangi, S. Sitharama Iye...
COMCOM
2006
147views more  COMCOM 2006»
13 years 9 months ago
Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks
Due to the application-specific nature of wireless sensor networks, application-aware algorithm and protocol design paradigms are highly required in order to optimize the overall ...
Wook Choi, Sajal K. Das