Sciweavers

500 search results - page 61 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
PPNA
2011
12 years 10 months ago
Ad-hoc limited scale-free models for unstructured peer-to-peer networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Durgesh Rani Kumari, Hasan Guclu, Murat Yuksel
P2P
2008
IEEE
184views Communications» more  P2P 2008»
14 years 2 months ago
Ad Hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Hasan Guclu, Durgesh Kumari, Murat Yuksel
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
ISI
2006
Springer
13 years 7 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
COMCOM
2006
70views more  COMCOM 2006»
13 years 7 months ago
Secret instantiation in ad-hoc networks
In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those...
Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora