Sciweavers

208 search results - page 28 / 42
» Securing wireless sensor networks against large-scale node c...
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 7 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
ICDCS
2011
IEEE
12 years 7 months ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 7 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 7 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
MSWIM
2006
ACM
14 years 1 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...