Sciweavers

1423 search results - page 17 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
MOBIHOC
2009
ACM
14 years 7 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
WINET
2002
101views more  WINET 2002»
13 years 6 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
IJAHUC
2006
128views more  IJAHUC 2006»
13 years 6 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
SIGKDD
2008
149views more  SIGKDD 2008»
13 years 6 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...