A framework for identifying compromised nodes in wireless sensor networks

Q Zhang, T Yu, P Ning - ACM Transactions on Information and System …, 2008 - dl.acm.org
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it and introduce arbitrary false …

[PDF][PDF] A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - researchgate.net
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …

[PDF][PDF] A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - seas.gwu.edu
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …

[PDF][PDF] A framework for identifying compromised nodes in sensor networks

Q Zhang, T Yu - 2005 - repository.lib.ncsu.edu
Sensor networks are often deployed in open environments. They are vulnerable to physical
attacks. Once a node's cryptographic key is compromised, an attacker may completely …

[PDF][PDF] A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - csc2.ncsu.edu
Sensor networks are often deployed in open environments. They are vulnerable to physical
attacks. Once a node's cryptographic key is compromised, an attacker may completely …

A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - 2006 Securecomm and Workshops, 2006 - ieeexplore.ieee.org
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …

A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - 2nd International ICST Conference on Security and …, 2007 - eudl.eu
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …

[PDF][PDF] A Framework for Identifying Compromised Nodes in Wireless Sensor Networks

Q ZHANG, T YU, P NING - Citeseer
In this paper, we propose an application-independent framework for accurately identifying
compromised sensor nodes. The framework provides an appropriate abstraction of …

[PDF][PDF] A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - scholar.archive.org
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …

A Framework for Identifying Compromised Nodes in Sensor Networks

Q Zhang, T Yu, P Ning - 2006 Securecomm and Workshops - infona.pl
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …