Sciweavers

412 search results - page 32 / 83
» Random Key Predistribution Schemes for Sensor Networks
Sort
View
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
15 years 5 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
84
Voted
GLOBECOM
2007
IEEE
15 years 5 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
IEEEARES
2007
IEEE
15 years 5 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
EUC
2005
Springer
15 years 4 months ago
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks
Wireless sensor networks comprise of small nodes with sensing, computation and wireless communication capabilities. The energy efficiency is a substantial key design issues in suc...
Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chi...
90
Voted
IPSN
2005
Springer
15 years 4 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu