Basic security of data transmission in battery-powered wireless sensor networks (WSNs) is typically achieved by symmetric-key encryption, which uses little energy; but solar-powered WSNs sometimes have sufficient energy to achieve a higher level of security through public-key encryption. However, if energy input and usage are not balanced, nodes may black out. By switching between symmetric-key and public-key encryption, based on an energy threshold, the level of security can be traded off against the urgency of energy-saving. This policy can also reduce the amount of energy used by some nodes in a WSN, since data encrypted using a public-key is simply relayed by intermediate nodes, whereas data encrypted using a symmetric-key must be decry...
This work is motivated by a general question: can energy harvesting capabil-ities embedded in modern...
Abstract. This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. S...
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
Abstract- This paper enhances the data confidentiality and energy saving of an existing solution. Ou...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract: In this recent years wireless sensors attracted the wireless sensor networks due to the si...
We consider two of the most important design issues for distributed sensor networks in the battlefie...
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovat...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Abstract—Wireless sensor networks are often deployed in open and uncontrolled environments that make...
This work is motivated by a general question: can energy harvesting capabil-ities embedded in modern...
Abstract. This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. S...
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
Abstract- This paper enhances the data confidentiality and energy saving of an existing solution. Ou...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract: In this recent years wireless sensors attracted the wireless sensor networks due to the si...
We consider two of the most important design issues for distributed sensor networks in the battlefie...
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovat...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Abstract—Wireless sensor networks are often deployed in open and uncontrolled environments that make...
This work is motivated by a general question: can energy harvesting capabil-ities embedded in modern...
Abstract. This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. S...
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated...