Sciweavers

688 search results - page 81 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
ADHOC
2007
164views more  ADHOC 2007»
13 years 8 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
14 years 1 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment con...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
DSD
2006
IEEE
114views Hardware» more  DSD 2006»
14 years 2 months ago
Improved Precision of Coarse Grained Localization in Wireless Sensor Networks
In wireless sensor networks, the coarse grained localization is a method to compute the position of randomly distributed sensor nodes. Without optimizations, it provides low preci...
Frank Reichenbach, Jan Blumenthal, Dirk Timmermann
LCN
2005
IEEE
14 years 1 months ago
Probabilistic Coverage in Wireless Sensor Networks
— The sensing capabilities of networked sensors are affected by environmental factors in real deployment and it is imperative to have practical considerations at the design stage...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
MOBISYS
2006
ACM
14 years 7 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...