Sciweavers

688 search results - page 89 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
IPSN
2009
Springer
14 years 3 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 2 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
PERCOM
2007
ACM
14 years 7 months ago
Energy-Efficient Data Dissemination for Wireless Sensor Networks
In order to disseminate a large amount of data through a sensor network, it is common to split the data into smallsized chunk packets. If the data is additionally encoded by a for...
Marcel Busse, Thomas Haenselmann, Wolfgang Effelsb...
TISSEC
2008
235views more  TISSEC 2008»
13 years 8 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
SECON
2008
IEEE
14 years 2 months ago
Breath: A Self-Adapting Protocol for Wireless Sensor Networks in Control and Automation
—The novel cross-layer protocol Breath for wireless sensor networks is designed, implemented, and experimentally evaluated. The Breath protocol is based on randomized routing, MA...
Pan Gun Park, Carlo Fischione, Alvise Bonivento, K...