Sciweavers

716 search results - page 4 / 144
» Robust communications for sensor networks in hostile environ...
Sort
View
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
14 years 2 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
CSREAPSC
2006
13 years 8 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
INFOCOM
2009
IEEE
14 years 2 months ago
Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach
—Detecting event frontline or boundary sensors in a complex sensor network environment is one of the critical problems for sensor network applications. In this paper, we propose ...
Min Ding, Xiuzhen Cheng
INFOCOM
2009
IEEE
14 years 2 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
PERCOM
2010
ACM
13 years 5 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik