Sciweavers

1051 search results - page 57 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICC
2007
IEEE
15 years 6 months ago
A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks
In this paper, a new strategy is proposed to defend against colluding malicious nodes in a sensor network. The new strategy is based on a new relaxation labeling algorithm to class...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
APNOMS
2007
Springer
15 years 7 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
TMC
2010
138views more  TMC 2010»
15 years 1 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
AICCSA
2007
IEEE
108views Hardware» more  AICCSA 2007»
15 years 9 months ago
On Secure Consensus Information Fusion over Sensor Networks
In this work we have examined the problem of consensus information fusion from a novel point of view, challenging the fundamental assumption of mutual trust among the fusion parti...
Mahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. R...