Sciweavers

6122 search results - page 141 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBISYS
2004
ACM
16 years 4 months ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
WOWMOM
2006
ACM
122views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Multiple-Access Insights from Bounds on Sensor Localization
In this paper, we build on known bounds on localization in sensor networks and provide new insights that can be used in multiple-access design from a localization perspective. Spe...
Swaroop Venkatesh, R. Michael Buehrer
WISEC
2009
ACM
15 years 11 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
TII
2010
139views Education» more  TII 2010»
14 years 11 months ago
The Impact of Temperature on Outdoor Industrial WSN Applications
The industrial world is currently considering the adoption of Wireless Sensor Networks (WSN) for industrial process and control applications. However, when using wireless sensor n...
Carlo Alberto Boano, James Brown, Nicolas Tsiftes,...
TDSC
2010
102views more  TDSC 2010»
15 years 2 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia