Sciweavers

743 search results - page 74 / 149
» Security for fixed sensor networks
Sort
View
DSN
2007
IEEE
14 years 3 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
EVOW
2006
Springer
14 years 19 days ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
COMCOM
2008
138views more  COMCOM 2008»
13 years 9 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
COMCOM
2006
70views more  COMCOM 2006»
13 years 9 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora
APWEB
2006
Springer
14 years 21 days ago
Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links
A Connected Dominating Set (CDS) can serve as a virtual backbone for a wireless sensor network since there is no fixed infrastructure or centralized management in wireless sensor n...
Ding-Zhu Du, My T. Thai, Yingshu Li, Dan Liu, Shiw...