Sciweavers

1129 search results - page 44 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
PERCOM
2010
ACM
13 years 7 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 9 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
LCN
2007
IEEE
14 years 3 months ago
Prototyping Service Discovery and Usage in Wireless Sensor Networks
—Heterogeneous Wireless Sensor Networks (WSNs) are envisioned to provide different types of services in an open and dynamic environment. This paper presents the design, implement...
Raluca Marin-Perianu, Hans Scholten, Paul J. M. Ha...
PERCOM
2006
ACM
14 years 8 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
APNOMS
2006
Springer
14 years 19 days ago
Performance Analysis of Service Differentiation for IEEE 802.15.4 Slotted CSMA/CA
In this paper, we propose two mechanisms, differentiation by backoff exponent and differentiation by the size of contention window, for IEEE 802.15.4 sensor networks to provide mul...
Meejoung Kim