Now showing items 1-2 of 2

    • Anonymity and Hostile Node Identification in Wireless Sensor Networks 

      Reindl, Phillip Steven (North Dakota State University, 2010)
      In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ...
    • Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks 

      Loree, Paul Edward (North Dakota State University, 2010)
      Many wireless sensor network applications require secure communication between nodes in the network. However, establishing pair-wise keys between nodes to provide security is challenging due to the limited resources in ...