Sciweavers

208 search results - page 2 / 42
» Securing wireless sensor networks against large-scale node c...
Sort
View
164
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 10 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
SASN
2006
ACM
15 years 9 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
119
Voted
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 10 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
140
Voted
ICC
2007
IEEE
157views Communications» more  ICC 2007»
15 years 9 months ago
Providing Transparent Security Services to Sensor Networks
— In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our key management module facilitating an efficient...
Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitr...
143
Voted
JIPS
2010
389views more  JIPS 2010»
14 years 10 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed