Many routing protocols have been proposed for sensor networks, but none addresses the security problems. Directed diffusion is one of the routing protocols for sensor networks. In this paper we study possible attacks on the directed diffusion routing protocol and propose the integration of LEAP, a keying mechanism in to the directed diffusion routing protocol. Our main goal is to identify the potential range of attacks in sensor network and minimize the effects of these attacks. We propose the use of three types of keys to help prevent the various attacks on the sensor nodes. Since the size of each type of key is only 8 bytes, a laptop class adversary can actually break the keys used by the sensor nodes. To minimize this type of attack we e...
This goal of this research was to create a network-based malware quarantine system and test the effe...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Wireless sensor networks are being used in a wide variety of applications ranging from home automati...
Sensor Network reprogramming is essential and crucial for software updates or bug fixes on nodes. Re...
The availability of low-power micro-sensors, actuators, radios and embedded processors is enabling t...
Radio-Frequency Identification Devices (RFID) is emerging as a pervasive computing technology with n...
This thesis is concerned with the study of secure wireless routing protocols, which have been deploy...
A collection of mobile nodes can form a multi-hop radio network with a dynamic topology and without ...
Responding to an attacker who has infiltrated a network has received little attention. In this thesi...
This project discusses the feasibility of using ultrasound to transmit data between computer systems...
This thesis furthers the development of Genetic Algorithms (GAs) and their application to the design...
In the past few years, there has been a keen interest in mining frequent itemsets in large data repo...
For the past decades, the Artificial Neural Networks (ANNs) have emerged as a popular tool for analy...
Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high leve...
Cryptography plays a vital role in data security against the attacks from the third party. In this t...
This goal of this research was to create a network-based malware quarantine system and test the effe...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Wireless sensor networks are being used in a wide variety of applications ranging from home automati...
Sensor Network reprogramming is essential and crucial for software updates or bug fixes on nodes. Re...
The availability of low-power micro-sensors, actuators, radios and embedded processors is enabling t...
Radio-Frequency Identification Devices (RFID) is emerging as a pervasive computing technology with n...
This thesis is concerned with the study of secure wireless routing protocols, which have been deploy...
A collection of mobile nodes can form a multi-hop radio network with a dynamic topology and without ...
Responding to an attacker who has infiltrated a network has received little attention. In this thesi...
This project discusses the feasibility of using ultrasound to transmit data between computer systems...
This thesis furthers the development of Genetic Algorithms (GAs) and their application to the design...
In the past few years, there has been a keen interest in mining frequent itemsets in large data repo...
For the past decades, the Artificial Neural Networks (ANNs) have emerged as a popular tool for analy...
Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high leve...
Cryptography plays a vital role in data security against the attacks from the third party. In this t...
This goal of this research was to create a network-based malware quarantine system and test the effe...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Wireless sensor networks are being used in a wide variety of applications ranging from home automati...