Sciweavers

182 search results - page 27 / 37
» Robust key establishment in sensor networks
Sort
View
BROADNETS
2006
IEEE
14 years 1 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
ADHOCNETS
2010
Springer
13 years 5 months ago
Event Detection in Wireless Sensor Networks - Can Fuzzy Values Be Accurate?
Event detection is a central component in numerous wireless sensor network (WSN) applications. In spite of this, the area of event description has not received enough attention. Th...
Krasimira Kapitanova, Sang Hyuk Son, Kyoung-Don Ka...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
IJSNET
2006
106views more  IJSNET 2006»
13 years 7 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
COMCOM
2006
150views more  COMCOM 2006»
13 years 7 months ago
Adaptive ad hoc self-organizing scheduling for quasi-periodic sensor network lifetime
Wireless sensor networks are poised to revolutionize our abilities in sensing and controlling our environment. Power conservation is a primary research concern for these networks....
Sharat C. Visweswara, Rudra Dutta, Mihail L. Sichi...