Sciweavers

38 search results - page 3 / 8
» Key management for long-lived sensor networks in hostile env...
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
ENTCS
2008
146views more  ENTCS 2008»
13 years 7 months ago
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on...
Keith M. Martin, Maura B. Paterson
SASN
2003
ACM
14 years 21 days ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
AINA
2007
IEEE
13 years 11 months ago
Efficient Battery Management for Sensor Lifetime
Abstract--Monitoring and automatic control of building environment is a crucial application of Wireless Sensor Network (WSN) in which maximizing network lifetime is a key challenge...
Malka Halgamuge
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
14 years 1 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...