Search
Now showing items 1-3 of 3
Anonymity and Hostile Node Identification in Wireless Sensor Networks
(North Dakota State University, 2010)
In many secure wireless network attack scenarios, the source of a data packet is as sensitive
as the data it contains. Existing work to provide source anonymity in wireless sensor
networks (WSN) are not frugal in terms ...
Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks
(North Dakota State University, 2010)
Many wireless sensor network applications require secure communication between nodes
in the network. However, establishing pair-wise keys between nodes to provide security is
challenging due to the limited resources in ...
Alternative Clustering Algorithms in Sensor Networks
(North Dakota State University, 2010)
A wireless sensor network is composed of a large number of tiny sensor
nodes that can be deployed in a variety of environments like battle fields, water,
large fields, and the like, and can transmit data to a Base station ...