Sciweavers

2099 search results - page 113 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis
TMC
2010
158views more  TMC 2010»
13 years 6 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
IPPS
2003
IEEE
14 years 1 months ago
A Hierarchical Model for Distributed Collaborative Computation in Wireless Sensor Networks
Clustering is an important characteristic of most sensor applications. In this paper we define COSMOS, the Cluster-based, heterOgeneouS MOdel for Sensor networks. The model assum...
Mitali Singh, Viktor K. Prasanna
INTERSENSE
2006
ACM
14 years 2 months ago
Multipath virtual sink architecture for wireless sensor networks in harsh environments
Wireless sensor networks are expected to be deployed in harsh environments characterized by extremely poor and fluctuating channel conditions. With the generally adopted single-s...
Winston Khoon Guan Seah, Hwee Pink Tan