Sciweavers

342 search results - page 8 / 69
» Distributed Detection of Node Replication Attacks in Sensor ...
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 2 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
INFOCOM
2011
IEEE
13 years 10 days ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
IJSN
2008
92views more  IJSN 2008»
13 years 9 months ago
Visualisation of wormholes in underwater sensor networks: a distributed approach
: We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dim...
Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mar...
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
14 years 3 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...