Sciweavers

4189 search results - page 87 / 838
» On the Security of Wireless Sensor Networks
Sort
View
AUSFORENSICS
2004
13 years 9 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
SENSYS
2004
ACM
14 years 1 months ago
Power - time optimal algorithm for computing FFT over sensor networks
bstract: Power - Time Optimal Algorithm for Computing FFT over Sensor Networks Categories and Subject Descriptors C.2.1 [Network Architecture and Design] Wireless Communication, Di...
Turkmen Canli, Mark Terwilliger, Ajay K. Gupta, As...
AINA
2007
IEEE
14 years 4 hour ago
Uniformity and Efficiency of a Wireless Sensor Network's Coverage
Abstract-- The primary contribution of this paper is in a wireless sensor network's coverage analysis method, which focuses on both the coverage itself and its uniformity and ...
Md. Ashiqur Rahman, Sajid Hussain
CSE
2009
IEEE
14 years 21 days ago
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol
—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource const...
Kunjan Patel, Lim Jong Chern, Chris J. Bleakley, W...
CORR
2011
Springer
148views Education» more  CORR 2011»
13 years 3 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski