Sciweavers

459 search results - page 44 / 92
» Secure sensor network routing: a clean-slate approach
Sort
View
SASN
2006
ACM
15 years 6 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
CCE
2007
15 years 15 days ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
114
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 7 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
WAIM
2007
Springer
15 years 6 months ago
Distributed, Hierarchical Clustering and Summarization in Sensor Networks
We propose DHCS, a method of distributed, hierarchical clustering and summarization for online data analysis and mining in sensor networks. Different from the acquisition and aggre...
Xiuli Ma, Shuangfeng Li, Qiong Luo, Dongqing Yang,...
122
Voted
JNW
2006
149views more  JNW 2006»
15 years 14 days ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo