Sciweavers

6122 search results - page 91 / 1225
» Securing network access in wireless sensor networks
Sort
View
CCS
2010
ACM
14 years 3 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
ICECCS
2009
IEEE
156views Hardware» more  ICECCS 2009»
13 years 6 months ago
Energy Efficient Duty Allocation Protocols for Wireless Sensor Networks
Wireless sensor networks require shared medium access management to prevent collisions, message corruption and other unhelpful effects. Cellular sensornets require minimal energy ...
Jonathan Tate, Iain Bate
WINET
2002
101views more  WINET 2002»
13 years 8 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 1 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
INFOCOM
2007
IEEE
14 years 3 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim