Results 81 to 90 of about 123,554 (249)
Efficient key management in wireless sensor network security [PDF]
Wireless sensor network is a multi-hop ad hoc network formed by a large number of low-cost micro-sensor nodes which communicate through radio channels.
Zhang, Xinyang
core
In recent times, the field of wireless sensor networks (WSNs) has attained a growing popularity in observing the environment due to its dynamic factors.
Tanzila Saba+5 more
doaj +1 more source
Polynomial based key predistribution scheme in wireless mesh networks
Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks.
Huang, Xinyi, Xu, Li, Zhang, Yuexin
core
The q-composite key predistribution scheme [1] is used prevalently for secure communications in large-scale wireless sensor networks (WSNs). Prior work [2]-[4] explores topological properties of WSNs employing the q-composite scheme for q = 1 with ...
Gligor, Virgil, Yağan, Osman, Zhao, Jun
core +1 more source
The Node Deployment of Intelligent Sensor Networks Based on the Spatial Difference of Farmland Soil
Considering that agricultural production is characterized by vast areas, scattered fields and long crop growth cycles, intelligent wireless sensor networks (WSNs) are suitable for monitoring crop growth information.
Naisen Liu+5 more
doaj +1 more source
Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security.
Copeland, Rebecca+3 more
core +1 more source
Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks
The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing.
Weigang Bai+3 more
doaj +1 more source
Multiphase deployment models for fast self healing in wireless sensor networks [PDF]
The majority of studies on security in resource limited wireless sensor networks (WSN) focus on finding an efficient balance among energy consumption, computational speed and memory usage.
Levi, Albert+4 more
core
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-
Aly, Salah A., Mlaih, Esam
core +1 more source
Security Property Validation of the Sensor Network Encryption Protocol (SNEP)
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use.
Salekul Islam
doaj +1 more source