Sciweavers

478 search results - page 32 / 96
» Forward-Secure Key Evolution in Wireless Sensor Networks
Sort
View
ALGOSENSORS
2007
Springer
14 years 11 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
PERCOM
2009
ACM
15 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
IDEAS
2006
IEEE
180views Database» more  IDEAS 2006»
15 years 3 months ago
SURCH: Distributed Aggregation over Wireless Sensor Networks
In this paper, we present SURCH, a novel decentralized algorithm for efficient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubraman...
SUTC
2006
IEEE
15 years 3 months ago
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors ...
Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. ...
IJSN
2007
120views more  IJSN 2007»
14 years 9 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...