Sciweavers

6122 search results - page 107 / 1225
» Securing network access in wireless sensor networks
Sort
View
142
Voted
PCI
2005
Springer
15 years 9 months ago
Towards In-Situ Data Storage in Sensor Databases
Abstract. The advances in wireless communications along with the exponential growth of transistors per integrated circuit lead to a rapid evolution of Wireless Sensor Devices (WSDs...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki, Dimi...
CACM
2000
158views more  CACM 2000»
15 years 4 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser
172
Voted
TWC
2008
138views more  TWC 2008»
15 years 4 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
IPSN
2005
Springer
15 years 9 months ago
Experiences and directions in pushpin computing
— Over the last three years we have built and experimented with the Pushpin Computing wireless sensor network platform. The Pushpin platform is a tabletop multihop wireless senso...
Joshua Lifton, Michael Broxton, Joseph A. Paradiso
142
Voted
IJSNET
2006
106views more  IJSNET 2006»
15 years 4 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue