Sciweavers

55 search results - page 11 / 11
» An authentication scheme for locating compromised sensor nod...
Sort
View
BROADNETS
2006
IEEE
13 years 11 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
MOBIHOC
2009
ACM
14 years 6 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 days ago
Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors
— In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves with the help of anchors that are pre-deployed in the network. Time of Arrival (ToA) is...
Satyajayant Misra, Guoliang Xue, Aviral Shrivastav...
CORR
2007
Springer
121views Education» more  CORR 2007»
13 years 5 months ago
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
—Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to ...
Hung-Ta Pai, Yunghsiang S. Han
JSAC
2006
183views more  JSAC 2006»
13 years 5 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran