Sciweavers

659 search results - page 87 / 132
» Anomaly intrusion detection in wireless sensor networks
Sort
View
ALGOSENSORS
2009
Springer
15 years 8 months ago
Self-stabilizing Deterministic Gathering
Abstract. In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, a...
Yoann Dieudonné, Franck Petit
SSDBM
2006
IEEE
111views Database» more  SSDBM 2006»
15 years 8 months ago
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
INFOCOM
2008
IEEE
15 years 8 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
110
Voted
MODELLIERUNG
2008
15 years 3 months ago
Domain-Specific Languages for Wireless Sensor Networks
The development of software for wireless sensor networks is involved and complex. This does not only impose much work on programmers but also prevents domain experts from directly ...
Daniel A. Sadilek
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 9 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran