Sciweavers

688 search results - page 2 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
TMC
2010
138views more  TMC 2010»
13 years 3 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
ADHOC
2008
69views more  ADHOC 2008»
13 years 5 months ago
Secure probabilistic location verification in randomly deployed wireless sensor networks
Eylem Ekici, Serdar Vural, Janise McNair, Dawood A...
ICUMT
2009
13 years 3 months ago
Secure aggregation in hybrid mesh/sensor networks
Several researchers are proposing information systems
Roberto Riggio, Sabrina Sicari
JSAC
2010
188views more  JSAC 2010»
13 years 7 days ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
ICSNC
2006
IEEE
13 years 11 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya