Sciweavers

500 search results - page 37 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 4 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
WIOPT
2010
IEEE
13 years 8 months ago
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks
—Opportunistic forwarding is a simple scheme for packet routing in ad hoc wireless networks such as duty cycling sensor networks in which reducing energy consumption is a princip...
Prithwish Basu, Saikat Guha
INFOCOM
2006
IEEE
14 years 4 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
APSEC
2004
IEEE
14 years 2 months ago
Dynamic Enclose Cell Routing in Mobile Sensor Networks
Many routing protocols for wireless sensor network have been proposed, with the purpose of achieving efficient routing. However, when the mobility increases rapidly and the networ...
Yuan Yang, Dong-hyun Lee, Myong-Soon Park, Hoh Pet...
CONEXT
2005
ACM
14 years 10 days ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati