[LIBRO][B] Protocols and architectures for wireless sensor networks
H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Enhancing source-location privacy in sensor network routing
One of the most notable challenges threatening the successful deployment of sensor
systems is privacy. Although many privacy-related issues can be addressed by security …
systems is privacy. Although many privacy-related issues can be addressed by security …
[PDF][PDF] Self-organization in ad hoc networks: Overview and classification
F Dressler - University of Erlangen, Dept. of Computer Science, 2006 - tkn.tu-berlin.de
Self-organization is a great concept for building scalable systems consisting of huge
numbers of subsystems. The primary objectives are coordination and collaboration on a …
numbers of subsystems. The primary objectives are coordination and collaboration on a …
Source-location privacy in energy-constrained sensor network routing
As sensor-driven applications become increasingly integrated into our lives, issues related
to sensor privacy will become increasingly important. Although many privacy-related issues …
to sensor privacy will become increasingly important. Although many privacy-related issues …
An energy-efficient multipath routing protocol for wireless sensor networks
YM Lu, VWS Wong - IEEE Vehicular Technology Conference, 2006 - ieeexplore.ieee.org
The energy consumption is a key design criterion for the routing protocols in wireless sensor
networks. Some of the conventional single path routing schemes may not be optimal to …
networks. Some of the conventional single path routing schemes may not be optimal to …
Sage: a strong privacy-preserving scheme against global eavesdrop** for ehealth systems
The eHealth system is envisioned as a promising approach to improving health care through
information technology, where security and privacy are crucial for its success and largescale …
information technology, where security and privacy are crucial for its success and largescale …
Secure data collection in wireless sensor networks using randomized dispersive routes
Compromised node and denial of service are two key attacks in wireless sensor networks
(WSNs). In this paper, we study data delivery mechanisms that can with high probability …
(WSNs). In this paper, we study data delivery mechanisms that can with high probability …
H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
W Lou, Y Kwon - IEEE Transactions on Vehicular Technology, 2006 - ieeexplore.ieee.org
Communication security and reliability are two important issues in any network. A typical
communication task in a wireless sensor network is for every sensor node to sense its local …
communication task in a wireless sensor network is for every sensor node to sense its local …
An efficient N-to-1 multipath routing protocol in wireless sensor networks
W Lou - IEEE International Conference on Mobile Adhoc and …, 2005 - ieeexplore.ieee.org
A typical task in a wireless sensor network is that every sensor node senses its local
environment and, upon request, sends the data of interest back to a base station. Based on …
environment and, upon request, sends the data of interest back to a base station. Based on …
Protecting receiver-location privacy in wireless sensor networks
Due to the open nature of a sensor network, it is relatively easy for an adversary to
eavesdrop and trace packet movement in the network in order to capture the receiver …
eavesdrop and trace packet movement in the network in order to capture the receiver …