Sciweavers

808 search results - page 116 / 162
» Attack-Resistant Location Estimation in Wireless Sensor Netw...
Sort
View
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
PERCOM
2008
ACM
15 years 9 months ago
Location Fingerprint Analyses Toward Efficient Indoor Positioning
Abstract--Analytical models to evaluate and predict "precision" performance of indoor positioning systems based on location fingerprinting are lacking. Such models can be...
Nattapong Swangmuang, Prashant Krishnamurthy
ICRA
1998
IEEE
114views Robotics» more  ICRA 1998»
15 years 2 months ago
A Twenty-Four Hour Tele-Nursing System Using a Ring Sensor
The objective of this paper is to present the recent development of the ring sensor to monitor a patient 24 hours a day for a tele-nursing system. The ring sensor is worn by the p...
Boo-Ho Yang, Sokwoo Rhee, Haruhiko Asada
ICRA
2008
IEEE
144views Robotics» more  ICRA 2008»
15 years 4 months ago
Decentralized mapping of robot-aided sensor networks
— A key problem in deploying sensor networks in real-world applications is that of mapping, i.e. determining the location of each sensor such that subsequent tasks such as tracki...
Joseph Djugash, Sanjiv Singh, Ben Grocholsky
MOBISYS
2003
ACM
15 years 9 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald