[LIBRO][B] Protocols and architectures for wireless sensor networks

H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …

Enhancing source-location privacy in sensor network routing

P Kamat, Y Zhang, W Trappe… - 25th IEEE international …, 2005 - ieeexplore.ieee.org
One of the most notable challenges threatening the successful deployment of sensor
systems is privacy. Although many privacy-related issues can be addressed by security …

[PDF][PDF] Self-organization in ad hoc networks: Overview and classification

F Dressler - University of Erlangen, Dept. of Computer Science, 2006 - tkn.tu-berlin.de
Self-organization is a great concept for building scalable systems consisting of huge
numbers of subsystems. The primary objectives are coordination and collaboration on a …

Source-location privacy in energy-constrained sensor network routing

C Ozturk, Y Zhang, W Trappe - Proceedings of the 2nd ACM workshop …, 2004 - dl.acm.org
As sensor-driven applications become increasingly integrated into our lives, issues related
to sensor privacy will become increasingly important. Although many privacy-related issues …

An energy-efficient multipath routing protocol for wireless sensor networks

YM Lu, VWS Wong - IEEE Vehicular Technology Conference, 2006 - ieeexplore.ieee.org
The energy consumption is a key design criterion for the routing protocols in wireless sensor
networks. Some of the conventional single path routing schemes may not be optimal to …

Sage: a strong privacy-preserving scheme against global eavesdrop** for ehealth systems

X Lin, R Lu, X Shen, Y Nemoto… - IEEE journal on selected …, 2009 - ieeexplore.ieee.org
The eHealth system is envisioned as a promising approach to improving health care through
information technology, where security and privacy are crucial for its success and largescale …

Secure data collection in wireless sensor networks using randomized dispersive routes

T Shu, M Krunz, S Liu - IEEE transactions on mobile computing, 2010 - ieeexplore.ieee.org
Compromised node and denial of service are two key attacks in wireless sensor networks
(WSNs). In this paper, we study data delivery mechanisms that can with high probability …

H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks

W Lou, Y Kwon - IEEE Transactions on Vehicular Technology, 2006 - ieeexplore.ieee.org
Communication security and reliability are two important issues in any network. A typical
communication task in a wireless sensor network is for every sensor node to sense its local …

An efficient N-to-1 multipath routing protocol in wireless sensor networks

W Lou - IEEE International Conference on Mobile Adhoc and …, 2005 - ieeexplore.ieee.org
A typical task in a wireless sensor network is that every sensor node senses its local
environment and, upon request, sends the data of interest back to a base station. Based on …

Protecting receiver-location privacy in wireless sensor networks

Y Jian, S Chen, Z Zhang… - IEEE INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
Due to the open nature of a sensor network, it is relatively easy for an adversary to
eavesdrop and trace packet movement in the network in order to capture the receiver …