Sciweavers

1692 search results - page 67 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ICASSP
2010
IEEE
15 years 16 hour ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 6 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
WS
2006
ACM
15 years 5 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
ADHOC
2008
69views more  ADHOC 2008»
14 years 12 months ago
Secure probabilistic location verification in randomly deployed wireless sensor networks
Eylem Ekici, Serdar Vural, Janise McNair, Dawood A...
COMCOM
2007
72views more  COMCOM 2007»
14 years 11 months ago
Trust-based security for wireless ad hoc and sensor networks
Azzedine Boukerche, Li Xu, Khalil El-Khatib