Sciweavers

738 search results - page 15 / 148
» Security considerations in ad hoc sensor networks
Sort
View
95
Voted
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
15 years 5 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
71
Voted
CCS
2009
ACM
15 years 6 months ago
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Steffen Reidt, Mudhakar Srivatsa, Shane Balfe
WISTP
2009
Springer
15 years 6 months ago
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Olivier Heen, Gilles Guette, Thomas Genet
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 12 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ICNP
2002
IEEE
15 years 4 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...