Sciweavers

914 search results - page 2 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WISTP
2007
Springer
13 years 11 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
AINA
2009
IEEE
13 years 7 months ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
14 years 6 months ago
Online Latent Variable Detection in Sensor Networks
Sensor networks attract increasing interest, for a broad range of applications. Given a sensor network, one key issue becomes how to utilize it efficiently and effectively. In par...
Jimeng Sun, Spiros Papadimitriou, Christos Falouts...
MOBIHOC
2005
ACM
14 years 4 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ALGOSENSORS
2007
Springer
13 years 6 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...