Sciweavers

914 search results - page 1 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
IPCCC
2007
IEEE
13 years 11 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
ALGOSENSORS
2009
Springer
13 years 11 months ago
Key Levels and Securing Key Predistribution against Node Captures
Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutyl...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
13 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ICEIS
2008
IEEE
13 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
SNPD
2007
13 years 6 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...