Sciweavers

85 search results - page 15 / 17
» Location-based compromise-tolerant security mechanisms for w...
Sort
View
ISPA
2005
Springer
14 years 18 days ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
COMSUR
2011
221views Hardware» more  COMSUR 2011»
12 years 7 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...
MSWIM
2005
ACM
14 years 20 days ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
CJ
2010
130views more  CJ 2010»
13 years 4 months ago
Dynamic Service Execution in Sensor Networks
Sensor networks face a number of challenges when deployed in unpredictable environments under dynamic, quickly changeable demands, and when shared by many partners, which is often...
Lei Chen 0005, Zijian Wang, Boleslaw K. Szymanski,...
COMCOM
2007
95views more  COMCOM 2007»
13 years 7 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...