Sciweavers

ESAS
2006
Springer
14 years 6 days ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
ESAS
2006
Springer
14 years 6 days ago
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks
Zinaida Benenson, Felix C. Freiling, Birgit Pfitzm...
ESAS
2006
Springer
14 years 6 days ago
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...
ESAS
2006
Springer
14 years 6 days ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
ESAS
2006
Springer
14 years 6 days ago
Ad Hoc Security Associations for Groups
Jukka Valkonen, N. Asokan, Kaisa Nyberg
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
14 years 6 days ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
DMSN
2006
ACM
14 years 6 days ago
Processing proximity queries in sensor networks
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Yannis Kotidis
DMSN
2006
ACM
14 years 6 days ago
Efficient handling of sensor failures
Sensors provide unprecedented access to a wealth of information from the physical environment in real-time. However, they suffer from a variety of resource limitations, most impor...
Andreea Berfield, Panos K. Chrysanthis, Alexandros...
DCOSS
2006
Springer
14 years 6 days ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan
DCOSS
2006
Springer
14 years 6 days ago
Network Power Scheduling for TinyOS Applications
This paper presents a study of the Flexible Power Scheduling protocol and evaluates its use for real-world sensor network applications and their platforms. FPS uses dynamically cre...
Barbara Hohlt, Eric A. Brewer