Sciweavers

743 search results - page 39 / 149
» Security for fixed sensor networks
Sort
View
ISCAS
2005
IEEE
161views Hardware» more  ISCAS 2005»
14 years 2 months ago
A traffic aware, energy efficient MAC protocol for wireless sensor networks
— In this paper, we focus on the problem of designing an energy efficient MAC protocol for wireless sensor networks and propose a novel scheme, named as TEEM (Traffic aware, Ener...
Changsu Suh, Young-Bae Ko
GI
2004
Springer
14 years 2 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...
COLCOM
2007
IEEE
14 years 3 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
NSDI
2008
13 years 11 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang
DCOSS
2008
Springer
13 years 10 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo