Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleDecember 2011
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 4Pages 442–447https://doi.org/10.1007/s11704-011-0197-5An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based ...
- articleSeptember 2011
Traceback in wireless sensor networks with packet marking and logging
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 3Pages 308–315https://doi.org/10.1007/s11704-011-0361-yIn a hostile environment, sensor nodes may be compromised and then be used to launch various attacks. One severe attack is false data injection which is becoming a serious threat to wireless sensor networks. An attacker uses the compromised node to ...
- articleSeptember 2011
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 3Pages 335–340https://doi.org/10.1007/s11704-011-0153-4Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols ...
- articleSeptember 2011
An adaptive polling interval and short preamble media access control protocol for wireless sensor networks
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 3Pages 300–307https://doi.org/10.1007/s11704-011-0134-7Media access control (MAC) protocols control how nodes access a shared wireless channel. It is critical to the performance of wireless sensor networks (WSN). An adaptive polling interval and short preamble MAC protocol (AX-MAC) is proposed in this ...
- articleSeptember 2010
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China (SPFCSC), Volume 4, Issue 3Pages 311–323https://doi.org/10.1007/s11704-010-0389-4With the advances in and convergence of Internet technologies, embedded computers, and wireless communication, computing devices have become part of our daily life. Hand-held devices and sensors with wireless connections create opportunities for many ...
- articleSeptember 2010
Packet transmission policies for battery operated wireless sensor networks
Frontiers of Computer Science in China (SPFCSC), Volume 4, Issue 3Pages 365–375https://doi.org/10.1007/s11704-010-0386-7With the concept of "Cognitive Sense of China" and "Smart Planet" proposed, wireless sensor networking is considered to be one of the most important technologies of the new century. In wireless sensor networks, how to extend battery lifetime is a core ...
- articleSeptember 2010
iSensNet: an infrastructure for research and development in wireless sensor networks
Frontiers of Computer Science in China (SPFCSC), Volume 4, Issue 3Pages 339–353https://doi.org/10.1007/s11704-010-0384-9This paper describes iSensNet, an infrastructure that we designed and implemented for various research and development projects in wireless sensor networks (WSNs). iSensNet is composed of a WSN platform and an event publish/subscribe middleware. On the ...
- articleSeptember 2010
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs
- Yunhao Liu,
- Guomo Zhou,
- Jizhong Zhao,
- Guojun Dai,
- Xiang-Yang Li,
- Ming Gu,
- Huadong Ma,
- Lufeng Mo,
- Yuan He,
- Jiliang Wang,
- Mo Li,
- Kebin Liu,
- Wei Dong,
- Wei Xi
Frontiers of Computer Science in China (SPFCSC), Volume 4, Issue 3Pages 334–338https://doi.org/10.1007/s11704-010-0123-2We introduce GreenOrbs, our recent effort in exploring the fundamental challenges and future direction of long-term large-scale applications of wireless sensor networks. An integrated framework with more than 1000 sensors has been implemented, including ...