Sciweavers

421 search results - page 49 / 85
» The price of security in wireless sensor networks
Sort
View
TDSC
2008
121views more  TDSC 2008»
13 years 7 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
NETWORK
2006
96views more  NETWORK 2006»
13 years 7 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
CCS
2006
ACM
13 years 11 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
DCOSS
2011
Springer
12 years 7 months ago
Compiling business process models for sensor networks
—Wireless sensor networks are increasingly being used to improve business processes. The behavior of such a process is usually captured in models while its implementation is typi...
Alexandra Caracas, Alexander Bernauer
CCS
2009
ACM
13 years 12 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...