Sciweavers

914 search results - page 3 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
EWSN
2009
Springer
14 years 6 months ago
Cooperative Intrusion Detection in Wireless Sensor Networks
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in...
Ioannis Krontiris, Zinaida Benenson, Thanassis Gia...
ISCC
2006
IEEE
169views Communications» more  ISCC 2006»
13 years 11 months ago
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Vasilis Chatzigiannakis, Symeon Papavassiliou, Mar...
COMCOM
2008
76views more  COMCOM 2008»
13 years 5 months ago
A study of self-organization mechanisms in ad hoc and sensor networks
Self-organization is a great concept for building scalable systems consisting of a huge number of subsystems. The primary objectives are improved scalability and dynamic adaptatio...
Falko Dressler
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
13 years 11 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
SENSYS
2009
ACM
14 years 12 days ago
FIND: faulty node detection for wireless sensor networks
Shuo Guo, Ziguo Zhong, Tian He