Sciweavers

38 search results - page 4 / 8
» Key management for long-lived sensor networks in hostile env...
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 1 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
ADHOC
2005
125views more  ADHOC 2005»
13 years 7 months ago
Security considerations in ad hoc sensor networks
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Fei Hu, Neeraj K. Sharma
INFOCOM
2005
IEEE
14 years 1 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
WIMOB
2007
IEEE
14 years 1 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li