Sciweavers

318 search results - page 43 / 64
» A survey of key management schemes in wireless sensor networ...
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
13 years 8 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
MOBIHOC
2007
ACM
14 years 8 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
GLOBECOM
2007
IEEE
14 years 3 months ago
Adaptive Mobility Management for IP/MPLS-Based Wireless Networks: A Proposal and Analysis
Abstract—In this paper, we propose a new adaptive MPLSenabled micro-mobility management scheme designed to track efficiently the mobility of nodes so as to minimize both handoff...
Rami Langar, Nizar Bouabdallah, Raouf Boutaba
WETICE
2002
IEEE
14 years 1 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 2 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...