Sciweavers

313 search results - page 19 / 63
» Securing Distributed Wireless Sensor Networks: Issues and Gu...
Sort
View
WISEC
2009
ACM
14 years 2 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
TIFS
2008
208views more  TIFS 2008»
13 years 7 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 1 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
SENSYS
2004
ACM
14 years 24 days ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner
WSNA
2003
ACM
14 years 19 days ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng