Sciweavers

736 search results - page 60 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
EWSN
2010
Springer
15 years 6 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
IJSNET
2007
91views more  IJSNET 2007»
14 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
JSAC
2010
86views more  JSAC 2010»
14 years 8 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 4 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
BSN
2009
IEEE
147views Sensor Networks» more  BSN 2009»
15 years 1 months ago
Classification of Physical Interactions between Two Subjects
This work addresses the problem of detecting and classifying the interaction between two subjects. While the use of Wireless Sensor Networks (WSN) for human action detection has b...
Ruzena Bajcsy, Alessandro Borri, Maria Domenica Di...