Sciweavers

4189 search results - page 214 / 838
» On the Security of Wireless Sensor Networks
Sort
View
MOBIHOC
2001
ACM
14 years 8 months ago
Distributed assignment of encoded MAC addresses in sensor networks
In wireless sensor networks, the vast majority of wide-scale traffic consists of only a few bytes, including all network and application layer IDs. Therefore, MAC addresses, which...
Curt Schurgers, Gautam Kulkarni, Mani B. Srivastav...
IEEEIAS
2008
IEEE
14 years 2 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
ADHOCNOW
2006
Springer
14 years 2 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
VLSISP
2008
95views more  VLSISP 2008»
13 years 8 months ago
A New Routing Metric for Satisfying Both Energy and Delay Constraints in Wireless Sensor Networks
Besides energy constraint, wireless sensor networks should also be able to provide bounded communication delay when they are used to support real-time applications. In this paper,...
Najet Boughanmi, Yeqiong Song
GLOBECOM
2008
IEEE
14 years 2 months ago
Design of a QoS-Aware Routing Mechanism for Wireless Multimedia Sensor Networks
—In wireless sensor networks, majority of routing protocols considered energy efficiency as the main objective and assumed data traffic with unconstrained delivery requirements...
Md. Abdul Hamid, Muhammad Mahbub Alam, Choong Seon...