Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Asymptotic analysis of failed recovery probability in a distributed wireless storage system with limited sum storage capacity
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
optimal storage allocation strategy
wireless storage
wireless sensor networks
Wireless communication
wireless channels
wireless channel conditions
System recovery
storage size
storage nodes
storage management
storage allocation
signal-to-noise ratio
Signal to noise ratio
resource management
probability
Approximation methods
maximum distance separable coding
limited sum storage capacity constraint
failed recovery probability
failed recovery
exponential order
distributed wireless storage systems
Distributed storage system
distributed storage node
distributed memory systems
Distributed databases
Decoding
Capacity planning
asymptotic failed recovery probability
asymptotic analysis
biblio
Trust-based QoS routing algorithm for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
packet transmission
WSN
wireless sensor networks
trust-based QoS routing algorithm
Trust Routing
telecommunication power management
telecommunication network routing
telecommunication control
routing algorithms
Routing
quality of service
QoS
Protocols
power control
Algorithm design and analysis
Packet loss
node clusting
LEACH protocol
LEACH
information transmission
energy efficient
Energy Efficiency
energy control
energy conservation
delays
Data Transmission
data communication
cluster head selection
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
IP-based wireless sensor networks
WSNs
wireless sensor networks
wireless sensor key exchange protocol
Wireless communication
security
Protocols
lightweight key exchange protocol WSKE
IPSEC-6LoWPAN networks
IPsec
authentication
IP networks
Internet key exchange version 2 mechanism
internet
IKEv2
formal verification
end-to-end security
Cryptographic Protocols
Communication system security
AVISPA
biblio
Self-Diagnosis for Detecting System Failures in Large-Scale Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Measurement
wireless sensor networks (WSNs)
wireless sensor networks
Wireless communication
traffic-sensitive sensor network
TinyD2
telecommunication traffic
telecommunication network reliability
state transitions
sink-based tool
self-diagnosis tool
Self-diagnosis
network diagnosis
100-node indoor testbed
large-scale wireless sensor network
indoor radio
GreenOrbs system
fault diagnosis
fault detector
fault detection
fault decision process
failure detection system
diagnosing sensor network
Detectors
debugging
accept state
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 2:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks
biblio
Key Management for Static Wireless Sensor Networks With Node Adding
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
random processes
wireless sensor networks (WSNs)
wireless sensor networks
transitory master key
telecommunication security
telecommunication network management
symmetric key management scheme
symmetric encryption
static wireless sensor network
security threat
secure communication
random seed distribution
Cryptographic Protocols
random key distribution
Protocols
protocol
Materials
Knowledge engineering
key management
Informatics
hardware tampering
eavesdropping
Cryptography
biblio
Security in Wireless Sensor Networks: Key Management Module in EECBKM
Submitted by BrandonB on Wed, 05/06/2015 - 1:41pm
packet delivery ratio
WSN communication
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
security information
Secuirty
Routing protocols
Routing
authentication
node capture attack
Nickel
limited memory resource
key management module
key management
energy consumption
energy constraint
EECBKM
Cryptography
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
An efficient and hybrid key management for heterogeneous wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:34pm
heterogeneous wireless sensor networks
wireless sensor networks
telecommunication security
telecommunication network management
symmetric encryption
sensor nodes
sensor network security
public key encryption method
key management
hybrid key management
asymmetric key cryptography
heterogeneous sensor networks
energy consumption
encryption
Elliptic curve cryptography
Cryptography
communication security
cluster heads
Base stations
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »