Sciweavers

36 search results - page 7 / 8
» Detecting Malicious Beacon Nodes for Secure Location Discove...
Sort
View
WS
2006
ACM
13 years 11 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
IPSN
2005
Springer
13 years 10 months ago
Adaptive statistical sampling methods for decentralized estimation and detection of localized phenomena
— Sensor networks (SNETs) for monitoring spatial phenomena has emerged as an area of significant practical interest. We focus on the important problem of detection of distribute...
Erhan Baki Ermis, Venkatesh Saligrama
MOBICOM
2006
ACM
13 years 11 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
SENSYS
2005
ACM
13 years 10 months ago
Sensor networks for medical care
Sensor networks have the potential to greatly impact many aspects of medical care. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-tim...
Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Th...
INFOCOM
2007
IEEE
13 years 11 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin