Sciweavers

6122 search results - page 180 / 1225
» Securing network access in wireless sensor networks
Sort
View
125
Voted
PERCOM
2006
ACM
16 years 4 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...
129
Voted
CONEXT
2006
ACM
15 years 10 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
132
Voted
CONEXT
2006
ACM
15 years 10 months ago
A WSN platform to support middleware development
According to the application domain, Wireless Sensor Networks (WSNs) differ in a number of ways (e. g., deployment strategy, node mobility, available resources, node heterogeneity...
André Rodrigues
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
15 years 10 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
EUROSYS
2007
ACM
16 years 1 months ago
Removing the memory limitations of sensor networks with flash-based virtual memory
Virtual memory has been successfully used in different domains to extend the amount of memory available to applications. We have adapted this mechanism to sensor networks, where,...
Andreas Lachenmann, Pedro José Marró...