Skip to main content
Hiermit erkläre ich, dass ich die vorliegende Arbeit, mit Ausnahme der in ihr ausdrücklich genannten Hilfen, selbstständig verfasst habe.
    • by 
    •   2  
      Wireless Sensor Network SecurityInsider Attack
Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal... more
    • by 
    •   2  
      CryptographyInsider Attack
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones,... more
    • by 
    •   2  
      Wireless Sensor Network SecurityDetection Probability
    • by 
    •   2  
      Distributed ComputingElectrical and Electronic Engineering
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks,... more
    • by 
    •   8  
      Distributed ComputingSensor Network SecurityRouting protocolsMobile Peer-to-Peer Network