Sciweavers

929 search results - page 70 / 186
» TinySA: a security architecture for wireless sensor networks
Sort
View
ESAS
2007
Springer
13 years 12 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
IJSNET
2007
115views more  IJSNET 2007»
13 years 7 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...
TITB
2010
111views Education» more  TITB 2010»
13 years 2 months ago
Using heterogeneous wireless sensor networks in a telemonitoring system for healthcare
Ambient intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system...
Juan M. Corchado, Javier Bajo, Dante I. Tapia, Aji...
ICDCS
2008
IEEE
14 years 2 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
LCN
2008
IEEE
14 years 2 months ago
Beasties: Simple wireless sensor nodes
—Interest in wireless sensor nodes has escalated over the past 10 years bringing with it a plethora of sensor hardware as well as protocol, algorithmic and application research. ...
Asher Hoskins, Julie A. McCann