Sciweavers

1692 search results - page 38 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
MSWIM
2009
ACM
15 years 6 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
GLOBECOM
2010
IEEE
14 years 9 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...
LCN
2006
IEEE
15 years 5 months ago
Linux Implementation and Evaluation of a Cooperation Mechanism for Hybrid Wireless Networks
Communication over multiple hops, such as in hybrid wireless networks, can only work if the individual hops cooperate by forwarding packets from other hops. We present the Linux i...
Attila Weyland, Torsten Braun, Thomas Staub, Carol...
IPCCC
2007
IEEE
15 years 6 months ago
Towards Survivable and Secure Wireless Sensor Networks
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
Yi Qian, Kejie Lu, David Tipper
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi