Sciweavers

230 search results - page 16 / 46
» Secure Comparison of Encrypted Data in Wireless Sensor Netwo...
Sort
View
IWCMC
2006
ACM
15 years 9 months ago
The hybrid mobile wireless sensor networks for data gathering
Introducing heterogeneous mobile devices, such as mobile phones into the large scale sparse wireless sensor networks is a promising research direction. These devices acting as mob...
Biao Ren, Jian Ma, Canfeng Chen
COMCOM
2007
104views more  COMCOM 2007»
15 years 3 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
131
Voted
DSN
2004
IEEE
15 years 7 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
ICOIN
2001
Springer
15 years 7 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IPSN
2005
Springer
15 years 8 months ago
Rope: robust position estimation in wireless sensor networks
— We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verificatio...
Loukas Lazos, Radha Poovendran, Srdjan Capkun