Sciweavers

140 search results - page 16 / 28
» Key predistribution for homogeneous wireless sensor networks...
Sort
View
COMSWARE
2007
IEEE
14 years 1 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
WINET
2010
179views more  WINET 2010»
13 years 6 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ADHOCNETS
2010
Springer
13 years 5 months ago
Sensorium - An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks
Communication neighborhood in wireless sensor networks changes often as links break or appear. Therefore, monitoring link quality and (logical) network topology is necessary. As no...
Stefan Nürnberger, Reinhardt Karnapke, Jö...
ALGOSENSORS
2007
Springer
13 years 9 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...