Sciweavers

28 search results - page 1 / 6
» Stealthy Compromise of Wireless Sensor Nodes with Power Anal...
Sort
View
MOBILIGHT
2010
12 years 11 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
SASN
2006
ACM
13 years 10 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
SASN
2004
ACM
13 years 10 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
12 years 11 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
CORR
2007
Springer
121views Education» more  CORR 2007»
13 years 4 months ago
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
—Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to ...
Hung-Ta Pai, Yunghsiang S. Han