Sciweavers

247 search results - page 16 / 50
» Protecting Receiver-Location Privacy in Wireless Sensor Netw...
Sort
View
115
Voted
EUROPKI
2007
Springer
15 years 8 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz
118
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 1 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
SASN
2005
ACM
15 years 7 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
154
Voted
INFOCOM
2011
IEEE
14 years 5 months ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...
143
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 8 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...