Sciweavers

2099 search results - page 198 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
138
Voted
SP
2002
IEEE
15 years 4 months ago
Stateful Intrusion Detection for High-Speed Networks
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Christopher Krügel, Fredrik Valeur, Giovanni ...
IPSN
2011
Springer
14 years 8 months ago
Radio diversity for reliable communication in WSNs
Deployment of wireless sensors in real world environments is often a frustrating experience. The quality of radio links is highly coupled to unpredictable physical environments, l...
Branislav Kusy, Christian Richter, Wen Hu, Mikhail...
157
Voted
IACR
2011
192views more  IACR 2011»
14 years 4 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
DMSN
2004
ACM
15 years 10 months ago
Active rules for sensor databases
Recent years have witnessed a rapidly growing interest in query processing in sensor and actuator networks. This is mainly due to the increased awareness of query processing as th...
Michael Zoumboulakis, George Roussos, Alexandra Po...
MOBICOM
2005
ACM
15 years 10 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora