Sciweavers

312 search results - page 42 / 63
» Location-aware key management scheme for wireless sensor net...
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
GLOBECOM
2007
IEEE
14 years 2 months ago
Adaptive Mobility Management for IP/MPLS-Based Wireless Networks: A Proposal and Analysis
Abstract—In this paper, we propose a new adaptive MPLSenabled micro-mobility management scheme designed to track efficiently the mobility of nodes so as to minimize both handoff...
Rami Langar, Nizar Bouabdallah, Raouf Boutaba
WETICE
2002
IEEE
14 years 20 days ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 2 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou