Sciweavers

215 search results - page 20 / 43
» Time synchronization attacks in sensor networks
Sort
View
95
Voted
TMC
2008
127views more  TMC 2008»
14 years 11 months ago
Time and Energy Complexity of Distributed Computation of a Class of Functions in Wireless Sensor Networks
We consider a scenario in which a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing a...
Nilesh Khude, Anurag Kumar, Aditya Karnik
83
Voted
IPPS
2006
IEEE
15 years 5 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 6 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
DSN
2005
IEEE
15 years 5 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 5 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...