Sciweavers

342 search results - page 46 / 69
» Distributed Detection of Node Replication Attacks in Sensor ...
Sort
View
ISCAPDCS
2008
13 years 10 months ago
EasyMAC: A New and Simple Protocol for Slot Assignment
We give a new distributed algorithm EasyMAC for the slot assignment for media access control (MAC) of nodes in a sensor network. Our algorithm reduces both the number of messages ...
Jerrolyn Brees, Sukhamay Kundu
DCOSS
2007
Springer
14 years 3 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
IWQOS
2004
Springer
14 years 2 months ago
Robust communications for sensor networks in hostile environments
— Clustering sensor nodes increases the scalability and energy efficiency of communications among them. In hostile environments, unexpected failures or attacks on cluster heads ...
Ossama Younis, Sonia Fahmy, Paolo Santi
COMCOM
2008
120views more  COMCOM 2008»
13 years 9 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
CCS
2006
ACM
14 years 17 days ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song