Sciweavers

1051 search results - page 101 / 211
» Secure Continuity for Sensor Networks
Sort
View
TDSC
2008
121views more  TDSC 2008»
15 years 4 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
MSWIM
2005
ACM
15 years 10 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
KES
2008
Springer
15 years 4 months ago
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach
Wireless sensor networks are widely used in environmental applications, like forest fire detection. Although forest fires occur relatively rarely, their number is increasing in Eur...
Kresimir Pripuzic, Hrvoje Belani, Marin Vukovic
SASN
2006
ACM
15 years 10 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
MOBISYS
2007
ACM
16 years 4 months ago
Accelerometer-based human abnormal movement detection in wireless sensor networks
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product reliability. An ideal application for wire...
T. Ryan Burchfield, S. Venkatesan