Sciweavers

2099 search results - page 29 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
APNOMS
2007
Springer
15 years 7 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
TMC
2010
138views more  TMC 2010»
15 years 1 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
87
Voted
PERCOM
2005
ACM
16 years 2 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
137
Voted
ICICS
2009
Springer
15 years 10 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
111
Voted
ICPPW
2003
IEEE
15 years 8 months ago
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, ...