Sciweavers

230 search results - page 16 / 46
» Secure Comparison of Encrypted Data in Wireless Sensor Netwo...
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
The hybrid mobile wireless sensor networks for data gathering
Introducing heterogeneous mobile devices, such as mobile phones into the large scale sparse wireless sensor networks is a promising research direction. These devices acting as mob...
Biao Ren, Jian Ma, Canfeng Chen
COMCOM
2007
104views more  COMCOM 2007»
13 years 7 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
DSN
2004
IEEE
13 years 11 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
ICOIN
2001
Springer
14 years 4 days ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
IPSN
2005
Springer
14 years 1 months ago
Rope: robust position estimation in wireless sensor networks
— We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verificatio...
Loukas Lazos, Radha Poovendran, Srdjan Capkun