Results 91 to 100 of about 123,554 (249)
A Grid-Based Linear Least Squares Self-Localization Algorithm in Wireless Sensor Network
Self-localization is one of the key technologies in the wireless sensor networks (WSN). Some traditional self-localization algorithms can provide a reasonable positioning accuracy only in a uniform and dense network, while for a nonuniform network the ...
Wei Wang+6 more
doaj +1 more source
Key distribution scheme of wireless sensor networks based on logic grid
Owed to the obvious characters of energy-constraint and dynamic topology, issues including confidentiality, integrality, authentication and no sufficient memory for abundance of key information, needed to be effectively solved in key management technique,
HUANG Hai-ping1, 2, WANG Ru-chuan1, 2
doaj +2 more sources
Group authentication and key distribution for sensors in wireless body area network [PDF]
Yong Ding+4 more
openalex +1 more source
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in ensuring secure intra-network communication.
O. A. Khashan+3 more
semanticscholar +1 more source
Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks
Key management is a core mechanism to provide secure and reliable communications in wireless sensor networks (WSNs). In large-scale WSNs, due to the resource constraint on sensor nodes, it is still an extremely challenging task to achieve good ...
Chu Xiaowen+4 more
doaj
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer ...
Jian Wang+2 more
doaj +1 more source
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks [PDF]
Trần Thanh Đại, Choong Seon Hong
openalex +1 more source
Secure and transparent data aggregation for wireless sensor networks
A secure and transparent data aggregation scheme for wireless sensor networks was proposed.Using hash function and XOR operation,the aggregation node completed the data integrity checking,source identity authentication and data aggregation without ...
Jiang-hong GUO, Jian-feng MA
doaj +2 more sources
Linear approaches to resilient aggregation in sensor networks
A sensor network is a network comprised of many small, wireless, resource-limited nodes that sense data about their environment and report readings to a base station. One technique to conserve power in a sensor network is to aggregate sensor readings hop-
Henry Kevin J., Stinson Douglas R.
doaj +1 more source
As one of the key application scenarios of wireless sensor networks, the coverage optimization of underwater wireless sensor networks (UWSNs) requires special consideration of three-dimensional spatial characteristics, which distinctly differs from ...
Zibo Huang+4 more
doaj +1 more source