Sciweavers

929 search results - page 50 / 186
» TinySA: a security architecture for wireless sensor networks
Sort
View
MOBILIGHT
2010
13 years 2 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
NETWORK
2011
13 years 2 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
MOBICOM
2006
ACM
14 years 1 months ago
Deployment analysis in underwater acoustic wireless sensor networks
In this paper, different deployment strategies for two-dimensional and three-dimensional communication architectures for UnderWater Acoustic Sensor Networks (UW-ASNs) are proposed...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
CACM
2008
84views more  CACM 2008»
13 years 8 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...