Sciweavers

2099 search results - page 96 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
DSN
2005
IEEE
14 years 1 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
ACMSE
2004
ACM
14 years 1 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
IJOE
2006
75views more  IJOE 2006»
13 years 8 months ago
Comparison of Intensive and Extensive Sensor Networking Technologies
The objective of this paper is to emphasize a clear and natural distinction in strategies of sensor network design. In order to display different architectural paradigms in today&#...
Marek Miskowicz
SECON
2007
IEEE
14 years 2 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
NDSS
1997
IEEE
14 years 7 days ago
Securing the Nimrod Routing Architecture
Karen E. Sirois, Stephen T. Kent