Sciweavers

2099 search results - page 132 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
SIGCSE
2006
ACM
158views Education» more  SIGCSE 2006»
14 years 3 months ago
Evaluations of target tracking in wireless sensor networks
Target tracking is one of the most important applications of wireless sensor networks. Optimized computation and energy dissipation are critical requirements to maximize the lifet...
Sam Phu Manh Tran, T. Andrew Yang
MOBIHOC
2005
ACM
14 years 8 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
WISEC
2010
ACM
14 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CORR
2004
Springer
147views Education» more  CORR 2004»
13 years 9 months ago
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet...
Ioan Raicu, Owen Richter, Loren Schwiebert, Sheral...
CCS
2003
ACM
14 years 2 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning