Sciweavers

688 search results - page 114 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
SECON
2007
IEEE
15 years 8 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
129
Voted
ESAS
2006
Springer
15 years 6 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
111
Voted
INFOCOM
2008
IEEE
15 years 8 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
INFOCOM
2003
IEEE
15 years 7 months ago
Unreliable Sensor Grids: Coverage, Connectivity and Diameter
Abstract— We consider an unreliable wireless sensor gridnetwork with n nodes placed in a square of unit area. We are interested in the coverage of the region and the connectivity...
Sanjay Shakkottai, R. Srikant, Ness B. Shroff
PERCOM
2007
ACM
16 years 2 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...