Graph Neuron (GN) is a network-centric algorithm which envisages a stable and structured network of tiny devices as the platform for parallel distributed pattern recognition. However, the unstructured and often dynami...
详细信息
We propose a new cooperative relaying technique for delivering high-rate data in mobile ad hoc networks. The proposed approach is to make each relay node to detect only a subset (called sub-stream) of the source data ...
详细信息
A sensor network consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. It may contain one or more base stations to collect sensed data and possibly relay it to ...
详细信息
Two asymmetric mechanisms are often employed in large-scale systems to achieve scalable and efficient authenticated broadcast. However, cryptographic asymmetry based on public-key schemes is computationally expensive,...
详细信息
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network l...
详细信息
ISBN:
(纸本)0780390326
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later, therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data;both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes.
Mobile ad hoc networks (MANET) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network attacks and therefore the security is a more significant issue than ...
详细信息
With respect to security, sensor networks have a number of considerations that separate them from traditional distributedsystems. First, sensor devices are typically vulnerable to physical compromise. Second, they ha...
详细信息
ISBN:
(纸本)1595932062
With respect to security, sensor networks have a number of considerations that separate them from traditional distributedsystems. First, sensor devices are typically vulnerable to physical compromise. Second, they have significant power and processing constraints. Third, the most critical security issue is protecting the (statistically derived) aggregate output of the system, even if individual nodes may be compromised. We suggest that these considerations merit a rethinking of traditional security techniques: rather than depending on the resilience of cryptographic techniques, in this paper we develop new techniques to tolerate compromised nodes and to even mislead an adversary. We present our initial work on probabilistically quantifying the security of sensor network protocols, with respect to sensor data distributions and network topologies. Beginning with a taxonomy of attacks based on an adversary's goals, we focus on how to evaluate the vulnerability of sensor network protocols to eavesdropping. Different topologies and aggregation functions provide different probabilistic guarantees about system security, and make different trade-offs in power and accuracy. Copyright 2005 ACM.
Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors, enabling attackers to use the keys and other information store...
详细信息
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment pr...
详细信息
ISBN:
(纸本)3540309993
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network services sharing. Our approach provides high performance andsecurity using one-way hashing functions for e-coin encryption. In our P2P-NetPay protocol, each peer's transaction does not involve any broker and double spending is detected during the redeeming transaction. We describe the motivation for P2P-NetPay and describe three transactions of the P2P-NetPay protocol in detail to illustrate the approach. We then discuss future research on this protocol.
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect to the environment. The UOI framewor...
详细信息
暂无评论