Sciweavers

301 search results - page 6 / 61
» Resilient Aggregation with Attack Detection in Sensor Networ...
Sort
View
IFIPTM
2009
127views Management» more  IFIPTM 2009»
14 years 9 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
119
Voted
ICICS
2010
Springer
14 years 9 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
MSN
2007
Springer
161views Sensor Networks» more  MSN 2007»
15 years 5 months ago
SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process ...
Chakib Bekara, Maryline Laurent-Maknavicius, Kheir...
IDEAS
2006
IEEE
180views Database» more  IDEAS 2006»
15 years 5 months ago
SURCH: Distributed Aggregation over Wireless Sensor Networks
In this paper, we present SURCH, a novel decentralized algorithm for efficient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubraman...
97
Voted
CCS
2010
ACM
15 years 22 days ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...