Sciweavers

444 search results - page 61 / 89
» Forum Session: Security for Wireless Sensor Networks
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
ADHOC
2007
109views more  ADHOC 2007»
13 years 7 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
IPSN
2010
Springer
14 years 2 months ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
WWW
2008
ACM
14 years 8 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
IWCMC
2006
ACM
14 years 1 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu