Sciweavers

738 search results - page 96 / 148
» Security considerations in ad hoc sensor networks
Sort
View
ICALT
2008
IEEE
14 years 3 months ago
A Pervasive Assessment System: Extending QTI to Incorporate Ad-hoc Wireless Sensors
Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
JSAC
2006
156views more  JSAC 2006»
13 years 8 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
SUTC
2006
IEEE
14 years 2 months ago
Protocol assessment issues in low duty cycle sensor networks: The switching energy
Energy assessment of MAC protocols for wireless sensor networks is generally based on the times of transmit, receive and sleep modes. The switching energy between two consecutive ...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Richard...
AINA
2006
IEEE
14 years 16 days ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
ACSAC
2008
IEEE
13 years 10 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....