Sciweavers

6122 search results - page 12 / 1225
» Securing network access in wireless sensor networks
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
SECON
2008
IEEE
14 years 1 months ago
Making Sensor Networks Accessible to Undergraduates Through Activity-Based Laboratory Materials
In 2003, the MIT Technology Review magazine listed wireless sensor networks as one of “Ten Emerging Technologies That Will Change the World” [2]. Five years later, are wireles...
Jens Mache, Damon Tyman, Nirupama Bulusu
ICDCSW
2005
IEEE
14 years 1 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
MOBIHOC
2006
ACM
14 years 7 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ESAS
2004
Springer
14 years 26 days ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...