Sciweavers

29 search results - page 6 / 6
» A resilient packet-forwarding scheme against maliciously pac...
Sort
View
TMC
2008
109views more  TMC 2008»
13 years 5 months ago
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
Key predistribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However,...
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing
IPSN
2005
Springer
13 years 11 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
SASN
2006
ACM
13 years 11 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
COMCOM
2006
194views more  COMCOM 2006»
13 years 5 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra