Sciweavers

1051 search results - page 110 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICWMC
2006
IEEE
15 years 10 months ago
Base Station Assisted Hierarchical Cluster-Based Routing
Wireless sensor networks (WSNs) are commonly used for continuously monitoring applications. This paper investigates a base station assisted energy efficient routing for hierarchi...
Sajid Hussain, Abdul Wasey Matin
MOBIHOC
2007
ACM
16 years 4 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
15 years 10 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment con...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 10 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
ACSAC
2006
IEEE
15 years 10 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra