Sciweavers

301 search results - page 4 / 61
» Resilient Aggregation with Attack Detection in Sensor Networ...
Sort
View
ICDCSW
2005
IEEE
13 years 11 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
FTDB
2011
98views more  FTDB 2011»
12 years 9 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...
JNSM
2008
93views more  JNSM 2008»
13 years 5 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
CSE
2009
IEEE
14 years 4 days ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
COMCOM
2006
100views more  COMCOM 2006»
13 years 5 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi