Sciweavers

500 search results - page 32 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
RTSS
2009
IEEE
14 years 5 months ago
Towards Stable Network Performance in Wireless Sensor Networks
Abstract—Many applications in wireless sensor networks require communication performance that is both consistent and high quality. Unfortunately, performance of current network p...
Shan Lin, Gang Zhou, Kamin Whitehouse, Yafeng Wu, ...
ENTCS
2007
131views more  ENTCS 2007»
13 years 10 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
INFOCOM
2005
IEEE
14 years 4 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
ITCC
2005
IEEE
14 years 4 months ago
Customizing a Geographical Routing Protocol for Wireless Sensor Networks
— Several problems are required to be fixed in order to apply geographical routing protocol Greedy Perimeter Stateless Routing (GPSR) in wireless sensor networks. First, GPSR is...
Jian Chen, Yong Guan, Udo W. Pooch
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
14 years 3 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...