Search For:

Displaying 1-5 out of 5 total
Transactional Confidentiality in Sensor Networks
Found in: IEEE Security and Privacy
By Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen B. Wicker, Deirdre K. Mulligan, Shankar Sastry
Issue Date:July 2008
pp. 28-35
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploy...
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry
Issue Date:May 2007
pp. 443-450
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been recently used in the domain of wireless ad hoc networks. It has been shown that...
Robust Estimation and Detection in Ad Hoc and Sensor Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Tanya Roosta, Shridhar Mishra, Ali Ghazizadeh
Issue Date:October 2006
pp. 236-245
Interest in robust detection and estimation in the presence of lying nodes has assumed importance in a number of applications. In this paper we motivate the robust detection and estimation problem using recent results for cooperative sensing in Cognitive R...
Key management and secure software updates in wireless process control environments
Found in: Proceedings of the first ACM conference on Wireless network security (WiSec '08)
By Alfonso Valdes, Dennis K. Nilsson, Tanya Roosta, Ulf Lindqvist
Issue Date:March 2008
pp. 1-1
Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce th...
Time synchronization attacks in sensor networks
Found in: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05)
By Michael Manzo, Shankar Sastry, Tanya Roosta
Issue Date:November 2005
pp. 107-116
Time synchronization is a critical building block in distributed wireless sensor networks. Because sensor nodes may be severely resource-constrained, traditional time-synchronization protocols cannot be used in sensor networks. Various time-synchronization...