×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [compromised node]
Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel
215 views
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar
216 views
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
225 views
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava
213 views
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Networks
233 views
[IJETA-V2I211]: Madan Mohan.K, Sudha.R, Shalini.K, Poongothai.T
218 views
Using Channel Diversity to Improve Security for Wireless Sensor Networks Matthew J. Miller University of Illinois at Urbana-Champaign
218 views
SECURE ROUTING IN WIRELESS SENSOR NETWORKS Gayathri Venkataraman Preeti Raghunath
219 views
1 Sensor Networks Security and Privacy in Sensor Networks Haowen Chan and Adrian Perrig SPINS Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and
226 views
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
47 views
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First
215 views
A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks
57 views
Next >