Sciweavers

42 search results - page 8 / 9
» Location-aware, Trust-based Detection and Isolation of Compr...
Sort
View
MOBIQUITOUS
2005
IEEE
13 years 12 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy
JPDC
2007
112views more  JPDC 2007»
13 years 6 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
ADHOC
2007
164views more  ADHOC 2007»
13 years 6 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
PERCOM
2006
ACM
14 years 5 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore
PERCOM
2008
ACM
14 years 5 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...