Sciweavers

500 search results - page 53 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
LCN
2002
IEEE
14 years 1 months ago
A First Look at Wired Sensor Networks for Video Surveillance Systems
Sensor networks are a major new area of research. Some sensor applications, such as video surveillance, will need to be tethered for reasons of bandwidth and power requirements. T...
Vijay Chandramohan, Kenneth J. Christensen
PERCOM
2011
ACM
13 years 20 days ago
A self-powered adaptive wireless sensor network for wastewater treatment plants
Efficient monitoring and control of wastewater treatment plants (WWTPs) has become an important public issue as the cost of electricity continues to grow and the quality requiremen...
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, ...
ESAS
2007
Springer
14 years 3 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan
JUCS
2007
136views more  JUCS 2007»
13 years 8 months ago
VCA: An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks
: Clustering provides an effective mechanism for energy-efficient data delivery in wireless sensor networks. To reduce communication cost, most clustering algorithms rely on a sens...
Min Qin, Roger Zimmermann
TPHOL
2009
IEEE
14 years 3 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...