Sciweavers

459 search results - page 20 / 92
» Secure sensor network routing: a clean-slate approach
Sort
View
129
Voted
COMCOM
2006
194views more  COMCOM 2006»
15 years 14 days ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
141
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 7 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
ESAS
2006
Springer
15 years 4 months ago
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models...
Baruch Awerbuch, Robert G. Cole, Reza Curtmola, Da...
130
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 7 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
115
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Pressure Routing for Underwater Sensor Networks
—A SEA Swarm (Sensor Equipped Aquatic Swarm) is a sensor cloud that drifts with water currents and enables 4D (space and time) monitoring of local underwater events such as conta...
Uichin Lee, Paul Wang, Youngtae Noh, Luiz Filipe M...