Sciweavers

769 search results - page 27 / 154
» Building Intrusion Detection with a Wireless Sensor Network
Sort
View
95
Voted
PERCOM
2005
ACM
16 years 1 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 7 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
ICDCS
2006
IEEE
15 years 8 months ago
In-Network Outlier Detection in Wireless Sensor Networks
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an algorithm that (1) is flexible with respect to the outlier definition, (2) wo...
Joel W. Branch, Boleslaw K. Szymanski, Chris Giann...
128
Voted
PERCOM
2005
ACM
16 years 1 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
GLOBECOM
2008
IEEE
15 years 8 months ago
On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks
—In this paper, the problem of deploying relay nodes in wireless sensor networks will be considered. A system consisting of a set of sensor nodes communicating to a fusion center...
Karim G. Seddik, K. J. Ray Liu