enter search term and/or author name
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
Qing Zhang, Ting Yu, Peng Ning
Article No.: 12
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often...
We give, for the first time, a precise mathematical analysis of the connectivity and security properties of sensor networks that make use of the random predistribution of keys. We also show how to set the parameters---pool and key ring size---in...
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
Katharine Chang, Kang G. Shin
Article No.: 14
Security in wireless sensor networks has become important as they are being developed and deployed for an increasing number of applications. The severe resource constraints in each sensor make it very challenging to secure sensor networks....
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Liang Xie, Sencun Zhu
Article No.: 15
Overlay multicast networks are used by service providers to distribute contents such as Web pages, static and streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to...
Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques...