Sciweavers

716 search results - page 58 / 144
» Robust communications for sensor networks in hostile environ...
Sort
View
ACSC
2004
IEEE
14 years 17 days ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ICW
2005
IEEE
167views Communications» more  ICW 2005»
14 years 2 months ago
Dynamic Software Reconfiguration in Sensor Networks
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper prese...
Sachin Kogekar, Sandeep Neema, Xenofon D. Koutsouk...
TPDS
2010
99views more  TPDS 2010»
13 years 7 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
INFOCOM
2012
IEEE
11 years 11 months ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...
SEC
2008
13 years 10 months ago
Realizing Stateful Public Key Encryption in Wireless Sensor Network
In this paper, we present our implementation of a stateful public key encryption (stateful PKE) scheme in the wireless sensor network (WSN) environment. In order to reduce the com...
Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun ...