Sciweavers

2282 search results - page 7 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 1 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
INFOCOM
2008
IEEE
14 years 1 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
ICDCS
2009
IEEE
14 years 3 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
IEEEARES
2007
IEEE
14 years 1 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
ICCS
2007
Springer
14 years 26 days ago
Reliability of Wireless Sensor Network with Sleeping Nodes
Abstract. Energy efficiency is an important technology of sensor networks development. In this paper we offer a method of sensors lifetime maximizing under required level of netwo...
Vladimir V. Shakhov, Hyunseung Choo