Sciweavers

59 search results - page 11 / 12
» A resilient key predistribution scheme for multiphase wirele...
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 18 days ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
INFOCOM
2007
IEEE
13 years 12 months ago
Analysis of A Loss-Resilient Proactive Data Transmission Protocol in Wireless Sensor Networks
Abstract— Many of sensor network applications require reliable data communication such that data packets can be delivered to the destination without loss. However, existing relia...
Yingqi Xu, Wang-Chien Lee, Jianliang Xu
IEEEARES
2007
IEEE
13 years 12 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
WINET
2010
199views more  WINET 2010»
13 years 4 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
JSAC
2006
127views more  JSAC 2006»
13 years 5 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang