Sciweavers

2099 search results - page 254 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CMS
2003
171views Communications» more  CMS 2003»
15 years 14 days ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
NOMS
2006
IEEE
15 years 5 months ago
System Support for Management of Networked Low-Power Sensors
— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
Jai-Jin Lim, Daniel L. Kiskis, Kang G. Shin
WSNA
2003
ACM
15 years 4 months ago
Proximity interactions between wireless sensors and their application
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...
NOMS
2006
IEEE
147views Communications» more  NOMS 2006»
15 years 5 months ago
DiMAPI: An Application Programming Interface for Distributed Network Monitoring
Abstract— Network monitoring and measurement is commonly regarded as an essential function for understanding, managing and improving the performance and security of network infra...
Panos Trimintzios, Michalis Polychronakis, Antonis...
INFOCOM
2003
IEEE
15 years 4 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson