Sciweavers

337 search results - page 12 / 68
» Attack Resiliency of Network Topologies
Sort
View
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 4 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
SASN
2006
ACM
14 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
ICC
2007
IEEE
14 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
CONEXT
2007
ACM
14 years 1 months ago
Internet routing resilience to failures: analysis and implications
Internet interdomain routing is policy-driven, and thus physical connectivity does not imply reachability. On average, routing on today's Internet works quite well, ensuring ...
Jian Wu, Ying Zhang, Zhuoqing Morley Mao, Kang G. ...
INFOCOM
2009
IEEE
14 years 4 months ago
Topology Formation for Wireless Mesh Network Planning
—Wireless mesh networks are becoming prevalent in providing access infrastructure to the public. Design of such networks involve several important goals including resilience to f...
Chun-cheng Chen, Chandra Chekuri, D. Klabjan