Sciweavers

459 search results - page 19 / 92
» Secure sensor network routing: a clean-slate approach
Sort
View
127
Voted
TIFS
2008
208views more  TIFS 2008»
15 years 9 days ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 7 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
102
Voted
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 7 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
114
Voted
ACSAC
1997
IEEE
15 years 4 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
ICASSP
2010
IEEE
15 years 18 days ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu