Results 91 to 100 of about 123,554 (249)

A Grid-Based Linear Least Squares Self-Localization Algorithm in Wireless Sensor Network

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Self-localization is one of the key technologies in the wireless sensor networks (WSN). Some traditional self-localization algorithms can provide a reasonable positioning accuracy only in a uniform and dense network, while for a nonuniform network the ...
Wei Wang   +6 more
doaj   +1 more source

Key distribution scheme of wireless sensor networks based on logic grid

open access: yesTongxin xuebao, 2009
Owed to the obvious characters of energy-constraint and dynamic topology, issues including confidentiality, integrality, authentication and no sufficient memory for abundance of key information, needed to be effectively solved in key management technique,
HUANG Hai-ping1, 2, WANG Ru-chuan1, 2
doaj   +2 more sources

Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks

open access: yesIEEE Access
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in ensuring secure intra-network communication.
O. A. Khashan   +3 more
semanticscholar   +1 more source

Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2010
Key management is a core mechanism to provide secure and reliable communications in wireless sensor networks (WSNs). In large-scale WSNs, due to the resource constraint on sensor nodes, it is still an extremely challenging task to achieve good ...
Chu Xiaowen   +4 more
doaj  

A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

open access: yesSensors, 2017
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer ...
Jian Wang   +2 more
doaj   +1 more source

Secure and transparent data aggregation for wireless sensor networks

open access: yesTongxin xuebao, 2012
A secure and transparent data aggregation scheme for wireless sensor networks was proposed.Using hash function and XOR operation,the aggregation node completed the data integrity checking,source identity authentication and data aggregation without ...
Jiang-hong GUO, Jian-feng MA
doaj   +2 more sources

Linear approaches to resilient aggregation in sensor networks

open access: yesJournal of Mathematical Cryptology, 2015
A sensor network is a network comprised of many small, wireless, resource-limited nodes that sense data about their environment and report readings to a base station. One technique to conserve power in a sensor network is to aggregate sensor readings hop-
Henry Kevin J., Stinson Douglas R.
doaj   +1 more source

Reinforcement Learning-Driven Hunter-Prey Algorithm Applied to 3D Underwater Sensor Network Coverage Optimization

open access: yesIEEE Access
As one of the key application scenarios of wireless sensor networks, the coverage optimization of underwater wireless sensor networks (UWSNs) requires special consideration of three-dimensional spatial characteristics, which distinctly differs from ...
Zibo Huang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy