Sciweavers

283 search results - page 28 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
TMC
2008
109views more  TMC 2008»
13 years 7 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 2 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
IPSN
2007
Springer
14 years 1 months ago
The worst-case capacity of wireless sensor networks
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...
Thomas Moscibroda
AHS
2006
IEEE
124views Hardware» more  AHS 2006»
14 years 1 months ago
A Generic On-Chip Debugger for Wireless Sensor Networks
— This invited paper overviews the low level debug support hardware required for an on-chip predeployment debugging system for sensor networks. The solution provides significant...
Andrew B. T. Hopkins, Klaus D. McDonald-Maier