Sciweavers

929 search results - page 24 / 186
» TinySA: a security architecture for wireless sensor networks
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
TITB
2010
129views Education» more  TITB 2010»
13 years 2 months ago
iCalm: wearable sensor and network architecture for wirelessly communicating and logging autonomic activity
Widespread use of affective sensing in healthcare applications has been limited due to several practical factors such as lack of comfortable wearable sensors, lack of wireless stan...
Richard Ribon Fletcher, Kelly Dobson, Matthew S. G...
ICASSP
2010
IEEE
13 years 8 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
TMC
2010
138views more  TMC 2010»
13 years 6 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
APNOMS
2007
Springer
13 years 12 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...