Sciweavers

5813 search results - page 1003 / 1163
» Sensor Networks
Sort
View
TMC
2008
83views more  TMC 2008»
15 years 2 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 1 months ago
A framework for proving the self-organization of dynamic systems
Abstract. This paper aims at providing a rigorous definition of selforganization, one of the most desired properties for dynamic systems (e.g., peer-to-peer systems, sensor networ...
Emmanuelle Anceaume, Xavier Défago, Maria P...
COMPSYSTECH
2009
15 years 23 days ago
Architectural models for realization of web-based personal health systems
: Recent advances in Information and Communication Technologies (ICT) and more specifically in wireless networks and mobile computing have driven new directions in the development ...
Mitko Shopov, Grisha Spasov, Galidia Petrova
EJWCN
2010
237views more  EJWCN 2010»
14 years 9 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
FTDB
2011
98views more  FTDB 2011»
14 years 6 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...
« Prev « First page 1003 / 1163 Last » Next »