Sciweavers

688 search results - page 85 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 2 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
DCOSS
2007
Springer
14 years 2 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
13 years 8 months ago
Fault-Tolerant k-Fold Pivot Routing in Wireless Sensor Networks
Selecting a small set of nodes called pivots, from all the nodes in a network and maintaining the routing infrastructure to and among each other can reduce routing overhead and ex...
Doina Bein
BSN
2009
IEEE
307views Sensor Networks» more  BSN 2009»
14 years 3 months ago
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
—Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors in BAN have to be energy...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
14 years 3 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao