Sciweavers

364 search results - page 20 / 73
» Application-Driven Node Management in Multihop Wireless Sens...
Sort
View
WIMOB
2007
IEEE
15 years 4 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
GIS
2009
ACM
15 years 29 days ago
Opportunistic sampling in wireless sensor networks
In an active WSN where user queries are regularly processed, a significant proportion of nodes relay and overhear data generated by other nodes in the network. In this paper, we ...
Muhammad Umer, Egemen Tanin, Lars Kulik
88
Voted
CCS
2010
ACM
14 years 10 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
WISTP
2007
Springer
15 years 3 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
ICOIN
2007
Springer
15 years 3 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong