Sciweavers

688 search results - page 106 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
SASN
2006
ACM
14 years 2 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
OTM
2007
Springer
14 years 2 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
WISEC
2010
ACM
14 years 1 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ICDCS
2008
IEEE
14 years 2 months ago
Enabling Accurate Node Control in Randomized Duty Cycling Networks
— In this paper, we propose a novel duty cycling algorithm for large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the se...
Kang-Won Lee, Vasileios Pappas, Asser N. Tantawi