Sciweavers

326 search results - page 35 / 66
» Group Rekeying Schemes for Secure Group Communication in Wir...
Sort
View
IPSN
2005
Springer
14 years 1 months ago
Geographic routing with limited information in sensor networks
Geographic routing with greedy relaying strategies have been widely studied as a routing scheme in sensor networks. These schemes assume that the nodes have perfect information ab...
Sundar Subramanian, Sanjay Shakkottai
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
ISPA
2005
Springer
14 years 1 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
WIMOB
2008
IEEE
14 years 2 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
WMCSA
2002
IEEE
14 years 27 days ago
Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks
We show how the database community’s notion of a generic query interface for data aggregation can be applied to ad-hoc networks of sensor devices. As has been noted in the senso...
Samuel Madden, Robert Szewczyk, Michael J. Frankli...