The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the partial target coverage (PTC) problem in wireless sensor networks with the objective of optimizing network lifetime. We first build a linear programming formulation, which takes total time a sensor spends on covering some targets into consideration, in order to obtain a lifetime upper bound. Then, based on the information of this formulation, we develop a sensor assignment...
Key distribution plays an important role in wireless sensor networks (WSNs), for information must be kept secure, even in an environment with limited storage ability and low data processing speed. However, it is a challenge to work in such a harsh requirement environment, the traditional key management scheme such as key distribution center (KDC) and public key cannot be used. Key pre-distribution...
The wireless sensor networks (WSNs) are normally operated in unattended, harsh, or hostile environment. The adversaries may easily compromise some sensor nodes and abuse their shared keys to inject false sensing reports or modify the reports sent by other nodes. Many applications in WSNs require secure group communications, which are supported by group keys. Once a malicious node is detected in the...
Sensor networks have been proposed for military and scientific applications such as border security and environment monitoring. They are usually deployed in unattended and hostile environments, so security is a major concern. A fundamental requirement in wireless network security is the ability to establish keys between pairs of sensors. In this paper, we propose a new location-based key management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.