Sciweavers

6122 search results - page 157 / 1225
» Securing network access in wireless sensor networks
Sort
View
ANTSW
2006
Springer
15 years 8 months ago
An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks
Abstract. Wireless Sensor Networks are characterized by having specific requirements such as limited energy availability, low memory and reduced processing power. On the other hand...
Tiago Camilo, Carlos Carreto, Jorge Sá Silv...
CONEXT
2008
ACM
15 years 6 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
15 years 11 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
AINA
2009
IEEE
15 years 11 months ago
A Dynamic Size Distributed Program Image Cache for Wireless Sensor Networks
— Reprogramming node software over-the-air is an essential requirement in many wireless sensor network applications due to the inaccessibility of the deployed sensor nodes. Trans...
Joshua Ellul, Kirk Martinez, David De Roure
WIMOB
2008
IEEE
15 years 11 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...