Sciweavers

361 search results - page 39 / 73
» Attack Detection in Wireless Localization
Sort
View
ICCCN
2007
IEEE
15 years 6 months ago
Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
—A robust filter-based approach is proposed for wireless sensor networks for detecting contours of a signal distribution over a 2-dimensional region. The motivation for contour d...
Hadi Alasti, William A. Armstrong, Asis Nasipuri
INFOCOM
2006
IEEE
15 years 5 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
INFOCOM
2012
IEEE
13 years 2 months ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
CORR
2007
Springer
148views Education» more  CORR 2007»
14 years 11 months ago
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
—In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter ...
Xin Zhang, H. Vincent Poor, Mung Chiang