Sciweavers

1051 search results - page 120 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICNP
2009
IEEE
15 years 2 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
JNW
2008
111views more  JNW 2008»
15 years 4 months ago
Wireless Sensor Network for Wearable Physiological Monitoring
Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wi...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
CJ
2010
130views more  CJ 2010»
15 years 1 months ago
Dynamic Service Execution in Sensor Networks
Sensor networks face a number of challenges when deployed in unpredictable environments under dynamic, quickly changeable demands, and when shared by many partners, which is often...
Lei Chen 0005, Zijian Wang, Boleslaw K. Szymanski,...
SECON
2007
IEEE
15 years 10 months ago
Approximation Algorithm for Base Station Placement in Wireless Sensor Networks
Base station location has significant impact on network lifetime performance for a sensor network. For a multihop sensor network, this problem is particular challenging as we need ...
Yi Shi, Yiwei Thomas Hou