The short paper draws a concrete map (Fig. 1) of security issues in sensor network. The literature survey is done and the sensor-relevant security areas are categorized into a table (Tab. 1). A concise summary is given at the end.
The work that is presented in this document is patent-pending and use, distribution or disclosure of any part of it requires a written permission of the author. (Abstract) Mobile Ad hoc NETworks (MANETs) are networks in which the participating nodes can move freely without having to worry about maintaining a direct connection to any particular fixed access… (More)
The Software Visualization (SV) discipline investigates approaches and techniques for static and dynamic graphical representations of algorithms, programs (code) and the processed data. SV is concerned primarily with analysis of programs and their development. The goal is to improve our understanding of inherently invisible and intangible software,… (More)
— The maximum likelihood (ML) and suboptimum ML (S-ML) detectors are derived in the first order moving average model. The ML and S-ML detectors are employed in the antipodal signaling system, and compared in terms of the bit-error-rate in impulsive environment. Numerical results show that the S-ML detector, despite reduced complexity and simpler structure,… (More)
Wireless sensor network (WSN) are. ad hoc mobile networks that include sensor nodes with limited computation and communication capabilities. We propose a new hierarchical key management scheme for wireless sensor network based on a combinatorial optimization of the group key management problem. This paper provides a method for dealing with multiple… (More)
The field of software visualization (SV) investigates approaches and techniques for static and dynamic graph-ical representations of algorithms, programs (code), and processed data. SV is concerned primarily with the analysis of programs and their development. The goal is to improve our understanding of inherently invisible and intangible software,… (More)