نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures. In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks. Our prop...
Many real-world networks are representations of dynamic systems with interactions that change over time, often in uncoordinated ways and at irregular intervals. For example, university students connect in intermittent groups that repeatedly form and dissolve based on multiple factors, including their lectures, interests, and friends. Such dynamic systems can be represented as multilayer network...
background: sentinel lymph node biopsy has shown to be a good alternative procedure for axillary lymph node dissection and to lead to lower frequency of morbidity, though this technique has its own side effects. it needs especial equipment and may not be available in some medical centers, especially in developing countries. this study aimed to identify a subgroup of patient...
In Mobile Sensor Network, attacker can easily capture a node and compromise that sensor node and extract keying materials from that compromised node and make replicas of them. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network .Then attacker use the replica node to inject fake data and disr...
Achieving security in resource-constrained wireless sensor networks is a challenging research task. Many key management schemes have been developed recently to provide secure communication between source and destination in wireless sensor networks. A serious threat highlighted in all of these schemes is that of node capture attacks, where an adversary gains full control over a sensor node throu...
Title of Dissertation : Security of Wireless Sensor Networks in the Presence of Captured Nodes Seyed
Title of Dissertation: Security of Wireless Sensor Networks in the Presence of Captured Nodes Seyed Farshad Bahari, Doctor of Philosophy, 2008 Dissertation directed by: Professor Virgil D. Gligor Department of Electrical & Computer Engineering Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes operate in an unattended manner in potentially hostile e...
Key establishment and its management in Wireless Sensor Networks is a challenging problem due to the limited resources and disordered structure of such networks. In this paper we propose a key management technique for Wireless Sensor Networks in building environments. In our solution each floor of a building is assigned a unique master key that will be used to generate other keys between pairs ...
Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms ot...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید