Sciweavers

736 search results - page 74 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
WIOPT
2005
IEEE
15 years 3 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
MSWIM
2006
ACM
15 years 3 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
COMSWARE
2008
IEEE
15 years 4 months ago
Undersea wireless sensor network for ocean pollution prevention
—The ability to effectively communicate underwater has numerous applications, such as oceanographic data collection, pollution monitoring, disaster prevention, assisted navigatio...
Arijit Khan, Lawrence Jenkins
SASN
2006
ACM
15 years 3 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
RAID
2004
Springer
15 years 3 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee