Sciweavers

209 search results - page 17 / 42
» Sensor Network Configuration Under Physical Attacks
Sort
View
MASS
2010
181views Communications» more  MASS 2010»
14 years 7 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
INTERSENSE
2006
ACM
15 years 3 months ago
Multipath virtual sink architecture for wireless sensor networks in harsh environments
Wireless sensor networks are expected to be deployed in harsh environments characterized by extremely poor and fluctuating channel conditions. With the generally adopted single-s...
Winston Khoon Guan Seah, Hwee Pink Tan
IPSN
2005
Springer
15 years 3 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
FTDCS
2004
IEEE
15 years 1 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
ACSAC
2006
IEEE
15 years 3 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra