Sciweavers

1051 search results - page 138 / 211
» Secure Continuity for Sensor Networks
Sort
View
IJSNET
2006
106views more  IJSNET 2006»
15 years 4 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
PERCOM
2006
ACM
16 years 3 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
COMPCON
1995
IEEE
15 years 7 months ago
REINAS: the Real-Time Environmental Information Network and Analysis System
The Real-Time Environmental Information Network and Analysis System (REINAS) is a distributed system supporting the conduct of regional environmental science research at the desk ...
Darrell D. E. Long, Patrick E. Mantey, Craig M. Wi...
IPPS
2006
IEEE
15 years 10 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot