Malicious code (or malware) is defined as a software designed to execute attacks on software systems and fulfill the harmful intents of an attacker. As lightweight embedded …
C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most challenging security problems are insider attacks. In this article we present security …
S Ransom, D Pfisterer, S Fischer - … of the 3rd international Workshop on …, 2008 - dl.acm.org
Providing usable security mechanisms for Wireless Sensor Networks (WSNs) is one of the important tasks to foster WSN development, as they will increasingly be deployed in real …
M Mansouri, A Sardouk… - Smart Wireless …, 2010 - books.google.com
The Wireless Sensor Networks (WSNs) are penetrating more and more our daily life. They are used in a large type of applications as supervision, tracking and control in military …
P Pecho, J Nagy, P Hanáček, M Drahanský - … 2009, Held as Part of the …, 2009 - Springer
We proposed modification of Collection Tree Protocol suitable for wireless sensors with tamper resistant module. This platform provides better security, however ordinary protocols …
I Krontiris - None, 2008 - madoc.bib.uni-mannheim.de
The broadcast nature of the transmission medium in wireless sensor networks makes information more vulnerable than in wired applications. In this dissertation we first propose a …
The emerging reality of wireless sensor networks deployed as long-lived infrastructure mandates an approach to tailor developed artefacts at run-time to avoid costly …
P Pecho, P Hanacek, J Nagy - Radioengineering, 2010 - core.ac.uk
The paper discusses characteristics and qualities of two routing protocols–Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for …
G Athanasios - Aalborg University, 2011 - vbn.aau.dk
Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor …