Sciweavers

1051 search results - page 27 / 211
» Secure Continuity for Sensor Networks
Sort
View
150
Voted
SNPD
2007
15 years 5 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
153
Voted
CONEXT
2005
ACM
15 years 5 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
132
Voted
ESAS
2004
Springer
15 years 9 months ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
119
Voted
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 2 months ago
Clustered Hierarchy in Sensor Networks: Performance and Security
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from...
Mohammed Abuhelaleh, Khaled M. Elleithy, Thabet M....
145
Voted
PEWASUN
2005
ACM
15 years 9 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari