Sciweavers

9233 search results - page 44 / 1847
» Sharing sensor networks
Sort
View
168
Voted
TWC
2008
138views more  TWC 2008»
15 years 3 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
151
Voted
CSE
2008
IEEE
15 years 10 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan
133
Voted
EUC
2007
Springer
15 years 9 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 10 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
124
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications
Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new midd...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu