Sciweavers

37 search results - page 3 / 8
» Decorrelating wireless sensor network traffic to inhibit tra...
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
TMC
2008
146views more  TMC 2008»
13 years 7 months ago
General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies
In multihop wireless sensor networks that are often characterized by many-to-one (convergecast) traffic patterns, problems related to energy imbalance among sensors often appear. S...
Zhao Cheng, Mark A. Perillo, Wendi B. Heinzelman
DSN
2005
IEEE
14 years 1 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
PERCOM
2008
ACM
14 years 7 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin