Sciweavers

2099 search results - page 96 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
DSN
2005
IEEE
15 years 3 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
ACMSE
2004
ACM
15 years 3 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
IJOE
2006
75views more  IJOE 2006»
14 years 10 months ago
Comparison of Intensive and Extensive Sensor Networking Technologies
The objective of this paper is to emphasize a clear and natural distinction in strategies of sensor network design. In order to display different architectural paradigms in today&#...
Marek Miskowicz
SECON
2007
IEEE
15 years 4 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
NDSS
1997
IEEE
15 years 2 months ago
Securing the Nimrod Routing Architecture
Karen E. Sirois, Stephen T. Kent