A grouping model for distributed pipeline assets maintenance decision

F Li, Y Sun, L Ma, J Mathew - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Distributed pipeline assets systems are crucial to society. The deterioration of these assets
and the optimal allocation of limited budget for their maintenance correspond to crucial …

The s-Mote: A versatile heterogeneous multi-radio platform for wireless sensor networks applications

E Popovici, D Boyle, S O'Connell, S Faul… - 2011 20th European …, 2011 - ieeexplore.ieee.org
This paper presents a novel architecture and its implementation for a versatile, miniaturised
mote which can communicate concurrently using a variety of combinations of ISM bands …

Security management in Wireless Sensor Networks for healthcare

T Oh, YB Choi, J Ryoo, K Stokes - International Journal of …, 2011 - inderscienceonline.com
This paper first discusses emerging security threats, requirements and solutions for WSNs.
In addition, the current applications and architectures of WSNs in healthcare systems are …

[PDF][PDF] Security architecture for at-home medical care using body sensor network

SS Mohanavalli, S Anand - International Journal of Ad …, 2011 - pdfs.semanticscholar.org
ABSTRACT Body Sensor Networks have considerably facilitated the continuous
measurement of physiological parameters of human body. The sensors used to measure the …

SCA security verification on wireless sensor network node

W He, C Pizarro, E de la Torre… - VLSI Circuits and …, 2011 - spiedigitallibrary.org
Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the
exhaustive mathematic calculation and precisely pin to certain points in the cryptographic …

[PDF][PDF] Intrusion Detection System for Ad hoc Mobile Networks

MN Khan, MI Khatak, M Faisal - International Journal of Computer …, 2011 - researchgate.net
Proactive security mechanism like authentication, confidentiality and non-repudiation are
difficult to implement in MANETs. Some additional security necessities are always desirable …

A middleware architecture for wireless sensor networks using secure web services

RW Scherer, JH Kleinschmidt - IEEE Latin America …, 2011 - ieeexplore.ieee.org
This paper proposes a service oriented middleware architecture for wireless sensor
networks (WSNs) with security requirements. The web services standards XML, SOAP and …

Wireless Sensor Networks: Emerging Applications and Security Solutions

S Mishra - … and Management: Advancing Technology and Practice, 2011 - igi-global.com
Wireless sensor networking technology has been used extensively by both commercial and
military applications for sensing and data collection purposes. The self-configuring, self …

[PDF][PDF] The s-mote: a versatile heterogeneous multi-radio

EM Popovici, D Boyle, S O'Connell, S Faul - 2011 - core.ac.uk
This paper presents a novel architecture and its implementation for a versatile, miniaturised
mote which can communicate concurrently using a variety of combinations of ISM bands …

AHP-Based Wireless Sensor Network Security Evaluation Model

R Fang, X Chen, L Zhao - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper is based on wireless sensor network security evaluation model. First, start from
the analysis of the current assessment model, then in the analysis of the structure wireless …