𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On handling insider attacks in wireless sensor networks

✍ Scribed by Christoph Krauß; Markus Schneider; Claudia Eckert


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
185 KB
Volume
13
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Trust management in wireless sensor netw
✍ Zahariadis, Theodore ;Leligou, Helen C. ;Trakadas, Panagiotis ;Voliotis, Stamati 📂 Article 📅 2010 🏛 John Wiley and Sons 🌐 English ⚖ 133 KB 👁 2 views

## Abstract The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhanc

Access control in wireless sensor networ
✍ Yun Zhou; Yanchao Zhang; Yuguang Fang 📂 Article 📅 2007 🏛 Elsevier Science 🌐 English ⚖ 294 KB

Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ''new'' nodes

Location-unaware coverage in wireless se
✍ Ossama Younis; Marwan Krunz; Srinivasan Ramasubramanian 📂 Article 📅 2008 🏛 Elsevier Science 🌐 English ⚖ 1018 KB

In scenarios where sensors are placed randomly, redundant deployment is essential for ensuring adequate field coverage. This redundancy needs to be efficiently exploited by periodically selecting a subset of nodes (referred to as a ''cover'') that actively monitor the field, and putting the remainin

Secure median computation in wireless se
✍ Sankardas Roy; Mauro Conti; Sanjeev Setia; Sushil Jajodia 📂 Article 📅 2009 🏛 Elsevier Science 🌐 English ⚖ 633 KB

Wireless sensor networks (WSNs) have proven to be useful in many applications, such as military surveillance and environment monitoring. To meet the severe energy constraints in WSNs, several researchers have proposed to use the in-network data aggregation technique (i.e., combining partial results