Sciweavers

1051 search results - page 108 / 211
» Secure Continuity for Sensor Networks
Sort
View
ESAS
2006
Springer
15 years 6 months ago
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networ...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 11 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
IJSNET
2007
95views more  IJSNET 2007»
15 years 4 months ago
On extracting consistent graphs in wireless sensor networks
: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (gra...
Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. ...
ICNSC
2007
IEEE
15 years 10 months ago
A novel approach for Self-Localization based on Computer Vision and Artificial Marker Deposition
— A new velocity and position sensor concept for manned and unmanned ground vehicles is proposed. The idea of this system is to temporarily place artificial markers in the enviro...
Savan Chhaniyara, Kaspar Althoefer, Yahya H. Zweir...
NAS
2010
IEEE
15 years 2 months ago
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, et...
Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zh...