Sciweavers

610 search results - page 88 / 122
» Application-level Simulation for Network Security
Sort
View
TWC
2008
138views more  TWC 2008»
14 years 9 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
COMPUTER
2004
80views more  COMPUTER 2004»
14 years 9 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
GLOBECOM
2010
IEEE
14 years 7 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
ICNP
2009
IEEE
14 years 7 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
NDSS
2008
IEEE
15 years 4 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu