Sciweavers

173 search results - page 3 / 35
» Detecting selective forwarding attacks in wireless sensor ne...
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
DCOSS
2007
Springer
14 years 1 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
ITIIS
2010
140views more  ITIIS 2010»
13 years 2 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
INFOCOM
2006
IEEE
14 years 1 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
WIMOB
2008
IEEE
14 years 1 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...