When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
In this paper, we present SURCH, a novel decentralized algorithm for efļ¬cient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
We propose and evaluate wireless sensor routing algorithms designed to extend the lifetime of a heterogeneous wireless sensor network. The network is heterogeneous in the sensorsā...