Sciweavers

1251 search results - page 102 / 251
» On the security of group communication schemes
Sort
View
WINET
2010
199views more  WINET 2010»
13 years 6 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
GLOBECOM
2008
IEEE
14 years 2 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun
SASN
2006
ACM
14 years 2 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
ICICS
1997
Springer
14 years 11 days ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
AUTOMATICA
2005
94views more  AUTOMATICA 2005»
13 years 8 months ago
A hierarchical cyclic pursuit scheme for vehicle networks
The agreement problem is studied whereby a group of mobile agents achieves convergence to a common point. A hierarchical cyclic pursuit scheme is introduced, and it is shown that ...
Stephen L. Smith, Mireille E. Broucke, Bruce A. Fr...