Sciweavers

13 search results - page 3 / 3
» TRMSim-WSN, Trust and Reputation Models Simulator for Wirele...
Sort
View
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
SECON
2007
IEEE
13 years 10 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
IWCMC
2006
ACM
13 years 10 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras