Search For:

Displaying 1-5 out of 5 total
Transactional Confidentiality in Sensor Networks
Found in: IEEE Security and Privacy
By Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen B. Wicker, Deirdre K. Mulligan, Shankar Sastry
Issue Date:July 2008
pp. 28-35
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploy...
 
MedSN System for In-Home Patient Monitoring: Architecture, Privacy and Security
Found in: Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
By Philip Kuryloski, Sameer Pai, Stephen Wicker, Yuan Xue
Issue Date:June 2007
pp. 189-191
MedSN System for In-Home Patient Monitoring: Architecture, Privacy and Security Philip Kuryloski, Sameer Pai, Stephen Wicker Cornell University Ithaca, NY 14850 {pjk25, skp27}@cornell.edu, {wicker}@ece.cornell.edu Yuan Xue Vanderbilt University Nashville, ...
 
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry
Issue Date:May 2007
pp. 443-450
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been recently used in the domain of wireless ad hoc networks. It has been shown that...
 
Networks of Sensors in Public Spaces: Combining Technology with Art
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen Wicker, Kirsten Boehner, Geri Gay
Issue Date:May 2007
pp. 396-402
This paper presents ongoing work with a wireless sensor network application at the Herbert Johnson Art Museum. We discuss the design and deployment of networked motes for the purpose of collecting information about museum visitors including number, density...
 
Performance Modeling and Analysis of the IEEE 802.11 Distribution Coordination Function in Presence of Hidden Stations
Found in: MILCOM
By Fu-yi Hung, Sameer Pai, Ivan Marsic
Issue Date:October 2006
pp. 1-7
In this paper, we propose an analytical model to evaluate the hidden station effect on the performance of the IEEE 802.11 Distributed Coordination Function (DCF). DCF is a random channel-access scheme based on Carrier Sense Multiple Access with Collision A...
 
 1