Sciweavers

69 search results - page 7 / 14
» Load-balanced key establishment methodologies in wireless se...
Sort
View
ICON
2007
IEEE
14 years 1 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
COMCOM
2007
142views more  COMCOM 2007»
13 years 7 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...
LCN
2008
IEEE
14 years 1 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
IPSN
2010
Springer
14 years 2 months ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
INFOCOM
2008
IEEE
14 years 1 months ago
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually...
Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang