Sciweavers

85 search results - page 4 / 17
» Location-based compromise-tolerant security mechanisms for w...
Sort
View
MOBISYS
2006
ACM
14 years 5 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
13 years 11 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
INFOCOM
2005
IEEE
13 years 11 months ago
Secure positioning of wireless devices with application to sensor networks
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
Srdjan Capkun, Jean-Pierre Hubaux
CORR
2008
Springer
181views Education» more  CORR 2008»
13 years 5 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 5 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan