Sciweavers

79 search results - page 3 / 16
» A Metabolic Approach to Protocol Resilience
Sort
View
113
Voted
SECON
2010
IEEE
14 years 9 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
94
Voted
MSWIM
2005
ACM
15 years 5 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
ICPADS
2007
IEEE
15 years 6 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
78
Voted
CONEXT
2008
ACM
15 years 1 months ago
AS alliance: cooperatively improving resilience of intra-alliance communication
The current interdomain routing protocol, BGP, is not resilient to a path failure due to its single-path and slowlyconverging route calculation. This paper proposes a novel approa...
Yuichiro Hei, Akihiro Nakao, Toru Hasegawa, Tomohi...
84
Voted
CCS
2010
ACM
14 years 11 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe