Sciweavers

914 search results - page 6 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ENTCS
2008
146views more  ENTCS 2008»
13 years 7 months ago
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on...
Keith M. Martin, Maura B. Paterson
INFOCOM
2006
IEEE
14 years 1 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 1 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
14 years 1 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment conï...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...