Sciweavers

362 search results - page 17 / 73
» Cooperative security in distributed sensor networks
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 7 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
EUC
2007
Springer
14 years 2 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
IPSN
2010
Springer
14 years 3 months ago
Distributed genetic evolution in WSN
Wireless Sensor Actuator Networks (WSANs) extend wireless sensor networks through actuation capability. Designing robust logic for WSANs however is challenging since nodes can aï¬...
Philip Valencia, Peter Lindsay, Raja Jurdak
SICHERHEIT
2010
13 years 6 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 8 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...