Sciweavers

1087 search results - page 64 / 218
» Secure Tracking in Sensor Networks
Sort
View
COMCOM
2007
142views more  COMCOM 2007»
15 years 4 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...
ESAS
2007
Springer
15 years 10 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
CCS
2006
ACM
15 years 7 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
EUC
2005
Springer
15 years 9 months ago
Dynamic Resource Discovery for Sensor Networks
As sensor networks mature the current generation of sensor networks that are application-specific and exposed only to a limited set of users will give way to heterogeneous sensor ...
Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, ...
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang