Sciweavers

606 search results - page 74 / 122
» Towards Survivable and Secure Wireless Sensor Networks
Sort
View
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
14 years 2 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment conï...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
MOBISYS
2006
ACM
14 years 8 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 3 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
AUTONOMICS
2007
ACM
14 years 23 days ago
Facet: towards a smart camera network of mobile phones
Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensor...
Philipp Bolliger, Moritz Köhler, Kay Röm...