Agilla: A mobile agent middleware for self-adaptive wireless sensor networks

CL Fok, GC Roman, C Lu - ACM Transactions on Autonomous and …, 2009 - dl.acm.org
This article presents Agilla, a mobile agent middleware designed to support self-adaptive
applications in wireless sensor networks. Agilla provides a programming model in which …

Arbitrary code injection through self-propagating worms in von neumann architecture devices

T Giannetsos, T Dimitriou, I Krontiris… - The Computer …, 2010 - academic.oup.com
Malicious code (or malware) is defined as a software designed to execute attacks on
software systems and fulfill the harmful intents of an attacker. As lightweight embedded …

On handling insider attacks in wireless sensor networks

C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …

Comprehensible security synthesis for wireless sensor networks

S Ransom, D Pfisterer, S Fischer - … of the 3rd international Workshop on …, 2008 - dl.acm.org
Providing usable security mechanisms for Wireless Sensor Networks (WSNs) is one of the
important tasks to foster WSN development, as they will increasingly be deployed in real …

Factors that may influence the performance of wireless sensor networks

M Mansouri, A Sardouk… - Smart Wireless …, 2010 - books.google.com
The Wireless Sensor Networks (WSNs) are penetrating more and more our daily life. They
are used in a large type of applications as supervision, tracking and control in military …

Secure collection tree protocol for tamper-resistant wireless sensors

P Pecho, J Nagy, P Hanáček, M Drahanský - … 2009, Held as Part of the …, 2009 - Springer
We proposed modification of Collection Tree Protocol suitable for wireless sensors with
tamper resistant module. This platform provides better security, however ordinary protocols …

Intrusion prevention and detection in wireless sensor networks

I Krontiris - None, 2008 - madoc.bib.uni-mannheim.de
The broadcast nature of the transmission medium in wireless sensor networks makes
information more vulnerable than in wired applications. In this dissertation we first propose a …

Policy-driven tailoring of sensor networks

N Matthys, C Huygens, D Hughes, J Ueyama… - Sensor Systems and …, 2011 - Springer
The emerging reality of wireless sensor networks deployed as long-lived infrastructure
mandates an approach to tailor developed artefacts at run-time to avoid costly …

[PDF][PDF] Simulation and evaluation of CTP and secure-CTP protocols

P Pecho, P Hanacek, J Nagy - Radioengineering, 2010 - core.ac.uk
The paper discusses characteristics and qualities of two routing protocols–Collection Tree
Protocol and its secure modification. The original protocol, as well as other protocols for …

[PDF][PDF] Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms

G Athanasios - Aalborg University, 2011 - vbn.aau.dk
Over the last few years, technological advances in the design of processors, memory, and
radio communications have propelled an active interest in the area of distributed sensor …