Sciweavers

500 search results - page 43 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
ICC
2007
IEEE
340views Communications» more  ICC 2007»
14 years 4 months ago
A Decentralized Positioning Method for Wireless Sensor Networks Based on Weighted Interpolation
— A decentralized sensor positioning algorithm is proposed using an adaptive weighted-interpolation method. The proposed method utilizes in-network processing among sensors to co...
Chin-Liang Wang, Yao-Win Hong, Yu-Sheng Dai
SASN
2006
ACM
14 years 4 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
JUCS
2006
86views more  JUCS 2006»
13 years 10 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
GLOBECOM
2007
IEEE
14 years 4 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis