Sciweavers

657 search results - page 71 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
ISCC
2009
IEEE
188views Communications» more  ISCC 2009»
15 years 10 months ago
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks
Abstract—In-network storage of data in wireless sensor networks contributes to reduce the communications inside the network and to favor data aggregation. In this paper, we consi...
Michele Albano, Stefano Chessa
184
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 10 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
137
Voted
AINA
2009
IEEE
15 years 10 months ago
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...
ISI
2006
Springer
15 years 3 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
139
Voted
LCN
2006
IEEE
15 years 9 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler