Sciweavers

614 search results - page 85 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
IPPS
2006
IEEE
14 years 1 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
IJSNET
2007
91views more  IJSNET 2007»
13 years 7 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 1 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
CEC
2010
IEEE
13 years 7 months ago
Multi-objective mobile agent-based Sensor Network Routing using MOEA/D
Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...