Sciweavers

170 search results - page 3 / 34
» A Rekey-Boosted Security Protocol in Hierarchical Wireless S...
Sort
View
SECON
2010
IEEE
13 years 3 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
JNW
2007
132views more  JNW 2007»
13 years 6 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
PERCOM
2010
ACM
13 years 4 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
IJSNET
2007
91views more  IJSNET 2007»
13 years 6 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
COMCOM
2006
88views more  COMCOM 2006»
13 years 6 months ago
A lightweight secure protocol for wireless sensor networks
Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao