Sciweavers

430 search results - page 32 / 86
» Secure Diffusion for Wireless Sensor Networks
Sort
View
111
Voted
TMC
2010
138views more  TMC 2010»
15 years 27 days ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
APNOMS
2007
Springer
15 years 6 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
TISSEC
2008
202views more  TISSEC 2008»
15 years 2 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
127
Voted
ICICS
2009
Springer
15 years 9 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
83
Voted
NSPW
2003
ACM
15 years 7 months ago
Towards a new paradigm for securing wireless sensor networks
K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wils...