Sciweavers

69 search results - page 12 / 14
» Load-balanced key establishment methodologies in wireless se...
Sort
View
BROADNETS
2006
IEEE
14 years 1 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...
ADHOC
2007
109views more  ADHOC 2007»
13 years 7 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 2 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
COMCOM
2004
102views more  COMCOM 2004»
13 years 7 months ago
The distinctive design characteristic of a wireless sensor network: the energy map
The key challenge in the design of a wireless sensor network is maximizing its lifetime. This is a fundamental problem and new protocol engineering principles need to be establish...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
ADHOCNETS
2010
Springer
13 years 5 months ago
Event Detection in Wireless Sensor Networks - Can Fuzzy Values Be Accurate?
Event detection is a central component in numerous wireless sensor network (WSN) applications. In spite of this, the area of event description has not received enough attention. Th...
Krasimira Kapitanova, Sang Hyuk Son, Kyoung-Don Ka...