Sciweavers

86 search results - page 13 / 18
» Defending Wireless Sensor Networks against Adversarial Local...
Sort
View
MOBIHOC
2003
ACM
15 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
MSWIM
2005
ACM
15 years 3 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
ESAS
2006
Springer
15 years 1 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
MDM
2009
Springer
192views Communications» more  MDM 2009»
15 years 4 months ago
Thresholded Range Aggregation in Sensor Networks
— The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding en...
Zhifeng Lin, Man Lung Yiu, Nikos Mamoulis
IPSN
2005
Springer
15 years 3 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu