Results 211 to 220 of about 101,732 (243)
Some of the next articles are maybe not open access.
2019
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen +2 more
openaire +1 more source
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen +2 more
openaire +1 more source
Towards realistic WSN evaluation
Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, 2011This work-in-progress presents our efforts on enabling on the credible evaluation of Wireless Sensor Networks (WSN) using the three basic evaluation environments available in this field: real-world deployments, testbeds, and simulators. The ultimate goal of this work is to define a complete set of realistic simulation and evaluation models for WSNs ...
Garg K. +3 more
openaire +1 more source
2020
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
2016
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic +2 more
openaire +1 more source
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic +2 more
openaire +1 more source
WSN-Based Audio Surveillance Systems
2009This work focuses on the analysis of fundamental issues which have to be considered in order to obtain voice from a wireless sensor network (WSN). The latter is assumed to be constituted by MicaZ wireless sensor nodes. Problems related to the transport of an audio signal through a wireless channel and sensor nodes are thus analyzed, and a project for ...
GRAZIOSI, FABIO +4 more
openaire +2 more sources
2016
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
2008
Wireless sensor network (WSN) technology is a new and modern technology that has already been implemented in a wide variety of scenarios, and its applications are growing every day. As models for mobile wireless networking become more popular, their appeal comes from the fact that they can operate autonomously without the need for an existing ...
Ana-Belén García-Hernando +4 more
openaire +1 more source
Wireless sensor network (WSN) technology is a new and modern technology that has already been implemented in a wide variety of scenarios, and its applications are growing every day. As models for mobile wireless networking become more popular, their appeal comes from the fact that they can operate autonomously without the need for an existing ...
Ana-Belén García-Hernando +4 more
openaire +1 more source
2014
The secured link between the sink and the sensing nodes in the WSN is a vital factor in many applicable fields. There are many applications of this network concern the human life or the national security of the countries. In this chapter, the different threats of WSN are discussed.
openaire +1 more source
The secured link between the sink and the sensing nodes in the WSN is a vital factor in many applicable fields. There are many applications of this network concern the human life or the national security of the countries. In this chapter, the different threats of WSN are discussed.
openaire +1 more source

