scispace - formally typeset
S

Sanjeev Setia

Researcher at George Mason University

Publications -  66
Citations -  5702

Sanjeev Setia is an academic researcher from George Mason University. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 33, co-authored 66 publications receiving 5600 citations. Previous affiliations of Sanjeev Setia include University of Maryland, College Park.

Papers
More filters
Journal ArticleDOI

Secure Data Aggregation in Wireless Sensor Networks

TL;DR: The synopsis diffusion approach is made secure against attacks in which compromised nodes contribute false subaggregate values, and a novel lightweight verification algorithm by which the base station can determine if the computed aggregate includes any false contribution.
Proceedings ArticleDOI

LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks

TL;DR: This paper presents LHAP a scalable and light-weight authentication protocol for ad hoc networks based on hop-by-hop authentication for verifying the authenticity of all the packets transmitted in the network and one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes.
Proceedings ArticleDOI

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks

TL;DR: The results show that Localized Multicast is more efficient than previous distributed approaches in terms of communication and memory costs and the probability of detecting node replicas is much higher than that achieved in previous distributed protocols.
Proceedings ArticleDOI

Availability and utility of idle memory in workstation clusters

TL;DR: The availability and utility of idle memory in workstation clusters is examined and how long guest data can be expected to survive is indicated; applications that access their data-sets frequently within the expected life-time of guest data are more likely to benefit from exploiting idle memory.
Journal ArticleDOI

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

TL;DR: An attack-resilient computation algorithm is presented to enable the base station to securely compute predicate count or sum even in the presence of such an attack, and shows that this algorithm outperforms other existing approaches.