169
click to vote
SASN
15 years 8 months ago
2006 ACM
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
132
click to vote
SASN
15 years 8 months ago
2006 ACM
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
125
click to vote
SASN
15 years 8 months ago
2006 ACM
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
137
click to vote
SASN
15 years 8 months ago
2006 ACM
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
140
click to vote
SASN
15 years 8 months ago
2006 ACM
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
|