Sciweavers

328 search results - page 48 / 66
» SIA: secure information aggregation in sensor networks
Sort
View
COMCOM
2006
97views more  COMCOM 2006»
13 years 11 months ago
Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
A number of routing protocols [1] have been proposed for wireless sensor networks in recent years. Considering energy-efficiency as the primary objective, most of routing protocol...
Min Chen, Taekyoung Kwon, Yanghee Choi
IPSN
2010
Springer
14 years 5 months ago
Self-identifying sensor data
Public-use sensor datasets are a useful scientific resource with the unfortunate feature that their provenance is easily disconnected from their content. To address this we intro...
Stephen Chong, Christian Skalka, Jeffrey A. Vaugha...
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 4 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
IJSN
2008
145views more  IJSN 2008»
13 years 11 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
EUROSEC
2010
ACM
14 years 5 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...