Sciweavers

163 search results - page 24 / 33
» A New Protocol for Securing Wireless Sensor Networks against...
Sort
View
DCOSS
2010
Springer
13 years 11 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
SP
2003
IEEE
14 years 1 months ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
WISEC
2009
ACM
14 years 2 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
SAC
2009
ACM
14 years 15 days ago
Opportunistic real-time routing in multi-hop wireless sensor networks
Wireless sensor networks (WSNs) are subject to significant resource constraints. Particularly, routing protocols for lowrate WSNs suffer from maintaining routing metrics and sta...
Junwhan Kim, Binoy Ravindran
WINET
2011
13 years 2 months ago
High performance, low complexity cooperative caching for wireless sensor networks
During the last decade, Wireless Sensor Networks (WSNs) have emerged and matured at such point that currently support several applications like environment control, intelligent bu...
Nikos Dimokas, Dimitrios Katsaros, Leandros Tassiu...