Sciweavers

6122 search results - page 172 / 1225
» Securing network access in wireless sensor networks
Sort
View
192
Voted
INFOCOM
2012
IEEE
13 years 7 months ago
Optimal surface deployment problem in wireless sensor networks
—Sensor deployment is a fundamental issue in a wireless sensor network, which often dictates the overall network performance. Previous studies on sensor deployment mainly focused...
Miao Jin, Guodong Rong, Hongyi Wu, Liang Shuai, Xi...
146
Voted
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
14 years 8 days ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
106
Voted
NETWORK
2008
72views more  NETWORK 2008»
15 years 4 months ago
Context-aware wireless sensor networks for assisted living and residential monitoring
Anthony D. Wood, John A. Stankovic, Gilles Virone,...
175
Voted
ICC
2009
IEEE
196views Communications» more  ICC 2009»
15 years 11 months ago
Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks
This work extends the existing static framework for joint flow control, routing and medium access control (MAC) in random access multi-hop wireless networks to a dynamic framewor...
Sucha Supittayapornpong, Poompat Saengudomlert
191
Voted
SASN
2006
ACM
15 years 10 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du