Sciweavers

736 search results - page 44 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Secure positioning of wireless devices with application to sensor networks
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
Srdjan Capkun, Jean-Pierre Hubaux
GLOBECOM
2007
IEEE
15 years 4 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
71
Voted
ACSAC
2006
IEEE
15 years 3 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
ACSAC
2004
IEEE
15 years 1 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
WONS
2005
IEEE
15 years 3 months ago
Dynamic Power Management in Wireless Sensor Networks: An Application-Driven Approach
Energy is a limited resource in wireless sensor networks. In fact, the reduction of power consumption is crucial to increase the lifetime of low power sensor networks. Several app...
Rodrigo M. Passos, Claudionor José Nunes Co...