Sciweavers

1116 search results - page 154 / 224
» Packet combining in sensor networks
Sort
View
EJWCN
2010
237views more  EJWCN 2010»
14 years 6 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 5 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
BROADNETS
2006
IEEE
15 years 5 months ago
SLIP-IN Architecture: A new Hybrid Optical Switching Scheme
— In this paper, we present a new hybrid switching architecture, termed as SLIP-IN, that combines electronic packet/burst with optical circuit switching. SLIP-IN architecture tak...
Kostas Ramantas, Kostas Christodoulopoulos, Kyriak...
ESAS
2006
Springer
15 years 2 months ago
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...
ICASSP
2011
IEEE
14 years 2 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane