Sciweavers

261 search results - page 32 / 53
» Multi-user Broadcast Authentication in Wireless Sensor Netwo...
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 8 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
EWSN
2007
Springer
14 years 8 months ago
Versatile Support for Efficient Neighborhood Data Sharing
Many applications in wireless sensor networks rely on data from neighboring nodes. However, the effort for developing efficient solutions for sharing data in the neighborhood is of...
Andreas Lachenmann, Daniel Minder, Kurt Rothermel,...
PERCOM
2007
ACM
14 years 8 months ago
Energy-Efficient Data Dissemination for Wireless Sensor Networks
In order to disseminate a large amount of data through a sensor network, it is common to split the data into smallsized chunk packets. If the data is additionally encoded by a for...
Marcel Busse, Thomas Haenselmann, Wolfgang Effelsb...
IPPS
2006
IEEE
14 years 2 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
INFOCOM
2010
IEEE
13 years 6 months ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller