نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience agai...
In this technical report, we analyze wireless sensor networks (WSN) under node capture and cloning attacks. Assuming that WSNs use symmetric keys, with key assignment based on a random key predistribution scheme, we provide extensive probabilistic analysis of WSNs under the attack. We define and characterize the following parameters: the number of nodes an adversary needs to capture in order to...
It is well known that the Ethernet medium access control protocol can cause signi cant short-term unfairness through a mechanism known as the Capture E ect, and that this unfairness condition is worst in heavily loaded Ethernets with a small number of active nodes. Recently, Ramakrishnan and Yang proposed Capture Avoidance Binary Exponential Backo (CABEB) to provide 1-packet-per-turn round robi...
One or more searchers must capture an invisible evader hiding in the nodes of a graph. We study this version of the graph search problem under additional restrictions, such as monotonicity and connectedness. We emphasize that we study node search, i.e., the capture of a node-located evader; this problem has so far received much less attention than edge search, i.e., the capture of an edge-locat...
Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon ...
Key management is the base of wireless sensor network security, key pre-distribution way is a high feasibility method in key management. The network connectivity rate, resilience against node capture and the storage consumption are important performance indicators in key pre-distribution way. However, most of the existing key pre-distribution schemes of wireless sensor network have the problems...
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
Correlated node behavior poses a great challenge for normal functioning of mobile ad hoc network. The impact could be devastating if the spreading of correlated node behavior will result in network failure. We model correlated node behavior by merging the principle of epidemic model and semi Markov process. Under merging condition, node behavior transition and epidemic model is converge to capt...
Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data relayed over each link and/or routed through each relay node, route diversity can be achieved, thus, extracting useful information from the network is rendered more challenging for adversaries. Sensor nodes operate with limited...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید