Sciweavers

2282 search results - page 8 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICOIN
2007
Springer
14 years 26 days ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
GLOBECOM
2008
IEEE
14 years 1 months ago
On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks
—In this paper, the problem of deploying relay nodes in wireless sensor networks will be considered. A system consisting of a set of sensor nodes communicating to a fusion center...
Karim G. Seddik, K. J. Ray Liu
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
13 years 12 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
AINA
2007
IEEE
13 years 6 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
MOBIHOC
2005
ACM
14 years 6 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....