Sciweavers

688 search results - page 29 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
EWSN
2009
Springer
14 years 8 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
SUTC
2006
IEEE
14 years 2 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...
ICASSP
2011
IEEE
12 years 12 months ago
Reaching consensus in asynchronous WSNs: Algebraic approach
Many models of wireless sensor networks (WSNs) assume a perfect synchronization along the graph of such network as a simplifying assumption. In our contribution we base our invest...
Ondrej Sluciak, Markus Rupp
INFOCOM
2006
IEEE
14 years 2 months ago
Is Deterministic Deployment Worse than Random Deployment for Wireless Sensor Networks?
— Before a sensor network is deployed, it is important to determine how many sensors are required to achieve a certain coverage degree. The number of sensor required for maintain...
Honghai Zhang, Jennifer C. Hou