نتایج جستجو برای: node capture

تعداد نتایج: 287175  

2007
Syed Muhammad Khaliq-ur-Rahman Raazi Adil Mehmood Khan Faraz Idris Khan Sungyoung Lee Young Jae Song Young-Koo Lee

In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience agai...

2010
Tamara Bonaci Linda Bushnell Radha Poovendran

In this technical report, we analyze wireless sensor networks (WSN) under node capture and cloning attacks. Assuming that WSNs use symmetric keys, with key assignment based on a random key predistribution scheme, we provide extensive probabilistic analysis of WSNs under the attack. We define and characterize the following parameters: the number of nodes an adversary needs to capture in order to...

1995
Wayne Hayes Mart Molle

It is well known that the Ethernet medium access control protocol can cause signi cant short-term unfairness through a mechanism known as the Capture E ect, and that this unfairness condition is worst in heavily loaded Ethernets with a small number of active nodes. Recently, Ramakrishnan and Yang proposed Capture Avoidance Binary Exponential Backo (CABEB) to provide 1-packet-per-turn round robi...

Journal: :CoRR 2009
Athanasios Kehagias Geoffrey A. Hollinger A. Gelastopoulos

One or more searchers must capture an invisible evader hiding in the nodes of a graph. We study this version of the graph search problem under additional restrictions, such as monotonicity and connectedness. We emphasize that we study node search, i.e., the capture of a node-located evader; this problem has so far received much less attention than edge search, i.e., the capture of an edge-locat...

Journal: :IJWNBT 2014
Rachit Mittal Manik Lal Das

Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon ...

2013
Li Lan Ying Yi Chun Huan Sun Jian Da Si Tie Qiang

Key management is the base of wireless sensor network security, key pre-distribution way is a high feasibility method in key management. The network connectivity rate, resilience against node capture and the storage consumption are important performance indicators in key pre-distribution way. However, most of the existing key pre-distribution schemes of wireless sensor network have the problems...

H. Haj Seyyed Javadi I. Qasemzadeh Kolagar M. Anzani

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

2013
Zul Azri Mohamad Noh

Correlated node behavior poses a great challenge for normal functioning of mobile ad hoc network. The impact could be devastating if the spreading of correlated node behavior will result in network failure. We model correlated node behavior by merging the principle of epidemic model and semi Markov process. Under merging condition, node behavior transition and epidemic model is converge to capt...

Journal: :Computer Standards & Interfaces 2015
Davut Incebacak Kemal Bicakci Bülent Tavli

Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data relayed over each link and/or routed through each relay node, route diversity can be achieved, thus, extracting useful information from the network is rendered more challenging for adversaries. Sensor nodes operate with limited...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید