Sciweavers

2705 search results - page 244 / 541
» Splitting the sensor node
Sort
View
158
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
163
Voted
GI
2005
Springer
15 years 10 months ago
On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks
: In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provi...
Thiemo Voigt, Adam Dunkels, Torsten Braun
151
Voted
SASN
2004
ACM
15 years 10 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
DCOSS
2008
Springer
15 years 6 months ago
On the Urban Connectivity of Vehicular Sensor Networks
Abstract. Aiming at a realistic mobile connectivity model for vehicular sensor networks in urban environments, we propose the combination of large-scale traffic simulation and comp...
Hugo Conceição, Michel Ferreira, Jo&...
SEC
2008
15 years 6 months ago
A Live Digital Forensic system for Windows networks
This paper presents FOXP (computer FOrensic eXPerience), an open source project to support network Live Digital Forensics (LDF), where the network nodes run a Windows NT family Ope...
Roberto Battistoni, Alessandro Di Biagio, Roberto ...