Sciweavers

4189 search results - page 144 / 838
» On the Security of Wireless Sensor Networks
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...
BSN
2009
IEEE
137views Sensor Networks» more  BSN 2009»
14 years 3 months ago
Technologies for an Autonomous Wireless Home Healthcare System
We present a design study highlighting our recent technological developments that will enable the implementation of autonomous wireless sensor networks for home healthcare monitori...
Christine Ho, Michael Mark, Michael Koplow, Lindsa...
BSN
2006
IEEE
124views Sensor Networks» more  BSN 2006»
14 years 2 months ago
Thin Film Piezoelectric Energy Scavenging Systems for Long Term Medical Monitoring
For small, inexpensive, ubiquitous wireless sensors to be realized, all constituents of the device, including the power source, must be directly integratable. For long term applic...
Elizabeth K. Reilly, Eric Carleton, Paul K. Wright
SUTC
2006
IEEE
14 years 2 months ago
Gathering-Load-Balanced Tree Protocol for Wireless Sensor Networks
Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu
PERCOM
2005
ACM
14 years 7 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp