نتایج جستجو برای: node capture

تعداد نتایج: 287175  

Journal: :I. J. Network Security 2008
Ashok Kumar Das

Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures. In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks. Our prop...

Journal: :CoRR 2017
Ulf Aslak Martin Rosvall Sune Lehmann

Many real-world networks are representations of dynamic systems with interactions that change over time, often in uncoordinated ways and at irregular intervals. For example, university students connect in intermittent groups that repeatedly form and dissolve based on multiple factors, including their lectures, interests, and friends. Such dynamic systems can be represented as multilayer network...

Journal: :archives of breast cancer 0
mohamadreza neishaboury department of surgery, tehran university of medical sciences, tehran, iran narjes mohamadzadeh department of surgery, tehran university of medical sciences, tehran, iran khatereh jamei research department, kaviani breast disease institute, tehran, iran ahmad kaviani department of surgery, tehran university of medical sciences, tehran, iran

background: sentinel  lymph  node  biopsy  has  shown  to  be  a  good  alternative procedure  for  axillary  lymph  node  dissection  and  to lead  to  lower  frequency  of morbidity, though this technique has its own side effects. it needs especial equipment and may not be available in some medical centers, especially in developing countries. this study aimed to identify a subgroup of patient...

2012
D.Vinoth Kannan S.Bala Murugan

In Mobile Sensor Network, attacker can easily capture a node and compromise that sensor node and extract keying materials from that compromised node and make replicas of them. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network .Then attacker use the replica node to inject fake data and disr...

2009
Kashif Kifayat Madjid Merabti Qi Shi David Llewellyn-Jones

Achieving security in resource-constrained wireless sensor networks is a challenging research task. Many key management schemes have been developed recently to provide secure communication between source and destination in wireless sensor networks. A serious threat highlighted in all of these schemes is that of node capture attacks, where an adversary gains full control over a sensor node throu...

2008
Seyed Farshad Bahari Virgil D. Gligor

Title of Dissertation: Security of Wireless Sensor Networks in the Presence of Captured Nodes Seyed Farshad Bahari, Doctor of Philosophy, 2008 Dissertation directed by: Professor Virgil D. Gligor Department of Electrical & Computer Engineering Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes operate in an unattended manner in potentially hostile e...

2006
Kashif Kifayat Madjid Merabti Qi Shi David Llewellyn-Jones

Key establishment and its management in Wireless Sensor Networks is a challenging problem due to the limited resources and disordered structure of such networks. In this paper we propose a key management technique for Wireless Sensor Networks in building environments. In our solution each floor of a building is assigned a unique master key that will be used to generate other keys between pairs ...

2012
Ramu kuchipudi N Md Jubair Basha

Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms ot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید