Sciweavers

89 search results - page 7 / 18
» Resisting against aggregator compromises in sensor networks
Sort
View
AIMS
2010
Springer
14 years 10 months ago
Towards Flexible and Secure Distributed Aggregation
Distributed aggregation algorithms are important in many present and future computing applications. However, after a decade of research, there are still numerous open questions reg...
Kristján Valur Jónsson, Mads F. Dam
WS
2005
ACM
15 years 3 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
IEEEARES
2007
IEEE
15 years 3 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
TON
2008
121views more  TON 2008»
14 years 9 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru
MOBIHOC
2005
ACM
15 years 9 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....