Sciweavers

40 search results - page 7 / 8
» Source traffic modeling in wireless sensor networks for targ...
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
12 years 11 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
MSN
2007
Springer
151views Sensor Networks» more  MSN 2007»
13 years 11 months ago
Applications and Performances of Extended TTDDs in Large-Scale Wireless Sensor Networks
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD ...
Hong Zhou, Lu Jin, Zhongwei Zhang, Hesham H. Ali, ...
IJDSN
2006
132views more  IJDSN 2006»
13 years 4 months ago
Using Misbehavior to Analyze Strategic versus Aggregate Energy Minimization in Wireless Sensor Networks
Abstract-- We present a novel formulation of the problem of energy misbehavior and develop an analytical framework for quantifying its impact on other nodes. Specifically, we formu...
Rajgopal Kannan, Shuangqing Wei, Vasu Chakravarthy...
ICCCN
2008
IEEE
13 years 11 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
CCECE
2006
IEEE
13 years 8 months ago
Modelling and Emulation of Multifractal Noise in Performance Evaluation of Mesh Networks
This paper describes a model and a setup for emulating fractal and multifractal noise for the measurement and evaluation of performance of ZigBee mesh networks intended for harsh ...
Lily Woo, Witold Kinsner, Ken Ferens, J. Diamond