Results 81 to 90 of about 123,554 (249)

Efficient key management in wireless sensor network security [PDF]

open access: yes
Wireless sensor network is a multi-hop ad hoc network formed by a large number of low-cost micro-sensor nodes which communicate through radio channels.
Zhang, Xinyang
core  

EGCIR: Energy-Aware Graph Clustering and Intelligent Routing Using Supervised System in Wireless Sensor Networks

open access: yesEnergies, 2020
In recent times, the field of wireless sensor networks (WSNs) has attained a growing popularity in observing the environment due to its dynamic factors.
Tanzila Saba   +5 more
doaj   +1 more source

Polynomial based key predistribution scheme in wireless mesh networks

open access: yes, 2012
Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks.
Huang, Xinyi, Xu, Li, Zhang, Yuexin
core  

On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels

open access: yes, 2014
The q-composite key predistribution scheme [1] is used prevalently for secure communications in large-scale wireless sensor networks (WSNs). Prior work [2]-[4] explores topological properties of WSNs employing the q-composite scheme for q = 1 with ...
Gligor, Virgil, Yağan, Osman, Zhao, Jun
core   +1 more source

The Node Deployment of Intelligent Sensor Networks Based on the Spatial Difference of Farmland Soil

open access: yesSensors, 2015
Considering that agricultural production is characterized by vast areas, scattered fields and long crop growth cycles, intelligent wireless sensor networks (WSNs) are suitable for monitoring crop growth information.
Naisen Liu   +5 more
doaj   +1 more source

Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

open access: yes, 2019
Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security.
Copeland, Rebecca   +3 more
core   +1 more source

Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks

open access: yesSensors, 2018
The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing.
Weigang Bai   +3 more
doaj   +1 more source

Multiphase deployment models for fast self healing in wireless sensor networks [PDF]

open access: yes, 2008
The majority of studies on security in resource limited wireless sensor networks (WSN) focus on finding an efficient balance among energy consumption, computational speed and memory usage.
Levi, Albert   +4 more
core  

Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks

open access: yes, 2008
In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-
Aly, Salah A., Mlaih, Esam
core   +1 more source

Security Property Validation of the Sensor Network Encryption Protocol (SNEP)

open access: yesComputers, 2015
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use.
Salekul Islam
doaj   +1 more source

Home - About - Disclaimer - Privacy