Sciweavers

55 search results - page 8 / 11
» An authentication scheme for locating compromised sensor nod...
Sort
View
DCOSS
2006
Springer
13 years 10 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 1 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
WISEC
2010
ACM
13 years 11 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
IPPS
2006
IEEE
14 years 21 days ago
The interleaved authentication for filtering false reports in multipath routing based sensor networks
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor ne...
Youtao Zhang, Jim Yang, Hai T. Vu
ACSAC
2006
IEEE
14 years 23 days ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra