A grouping model for distributed pipeline assets maintenance decision
F Li, Y Sun, L Ma, J Mathew - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Distributed pipeline assets systems are crucial to society. The deterioration of these assets
and the optimal allocation of limited budget for their maintenance correspond to crucial …
and the optimal allocation of limited budget for their maintenance correspond to crucial …
The s-Mote: A versatile heterogeneous multi-radio platform for wireless sensor networks applications
This paper presents a novel architecture and its implementation for a versatile, miniaturised
mote which can communicate concurrently using a variety of combinations of ISM bands …
mote which can communicate concurrently using a variety of combinations of ISM bands …
Security management in Wireless Sensor Networks for healthcare
This paper first discusses emerging security threats, requirements and solutions for WSNs.
In addition, the current applications and architectures of WSNs in healthcare systems are …
In addition, the current applications and architectures of WSNs in healthcare systems are …
[PDF][PDF] Security architecture for at-home medical care using body sensor network
SS Mohanavalli, S Anand - International Journal of Ad …, 2011 - pdfs.semanticscholar.org
ABSTRACT Body Sensor Networks have considerably facilitated the continuous
measurement of physiological parameters of human body. The sensors used to measure the …
measurement of physiological parameters of human body. The sensors used to measure the …
SCA security verification on wireless sensor network node
W He, C Pizarro, E de la Torre… - VLSI Circuits and …, 2011 - spiedigitallibrary.org
Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the
exhaustive mathematic calculation and precisely pin to certain points in the cryptographic …
exhaustive mathematic calculation and precisely pin to certain points in the cryptographic …
[PDF][PDF] Intrusion Detection System for Ad hoc Mobile Networks
Proactive security mechanism like authentication, confidentiality and non-repudiation are
difficult to implement in MANETs. Some additional security necessities are always desirable …
difficult to implement in MANETs. Some additional security necessities are always desirable …
A middleware architecture for wireless sensor networks using secure web services
RW Scherer, JH Kleinschmidt - IEEE Latin America …, 2011 - ieeexplore.ieee.org
This paper proposes a service oriented middleware architecture for wireless sensor
networks (WSNs) with security requirements. The web services standards XML, SOAP and …
networks (WSNs) with security requirements. The web services standards XML, SOAP and …
Wireless Sensor Networks: Emerging Applications and Security Solutions
S Mishra - … and Management: Advancing Technology and Practice, 2011 - igi-global.com
Wireless sensor networking technology has been used extensively by both commercial and
military applications for sensing and data collection purposes. The self-configuring, self …
military applications for sensing and data collection purposes. The self-configuring, self …
[PDF][PDF] The s-mote: a versatile heterogeneous multi-radio
This paper presents a novel architecture and its implementation for a versatile, miniaturised
mote which can communicate concurrently using a variety of combinations of ISM bands …
mote which can communicate concurrently using a variety of combinations of ISM bands …
AHP-Based Wireless Sensor Network Security Evaluation Model
R Fang, X Chen, L Zhao - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper is based on wireless sensor network security evaluation model. First, start from
the analysis of the current assessment model, then in the analysis of the structure wireless …
the analysis of the current assessment model, then in the analysis of the structure wireless …