Sciweavers

688 search results - page 45 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Blocking Vulnerable Paths of Wireless Sensor Networks
— In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as m...
Shu Zhou, Min-You Wu, Wei Shu
CCS
2006
ACM
13 years 12 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
ADHOCNOW
2010
Springer
13 years 9 months ago
Coverage-Adaptive Random Walks for Fast Sensory Data Collection
Random walks in wireless sensor networks can serve as fully local, very simple strategies for sink motion that reduce energy dissipation a lot but increase the latency of data coll...
Constantinos Marios Angelopoulos, Sotiris E. Nikol...
PIMRC
2010
IEEE
13 years 6 months ago
On the feasibility of receive collaboration in wireless sensor networks
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms for better reception of a signal. For receive co...
Behnam Banitalebi, S. Sigg, M. Beigl
LCN
2008
IEEE
14 years 2 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost