Sciweavers

699 search results - page 53 / 140
» Cooperative Intrusion Detection in Wireless Sensor Networks
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
INFOCOM
2007
IEEE
15 years 4 months ago
Toward Optimal Data Aggregation in Random Wireless Sensor Networks
Abstract— Data gathering is one of the most important services provided by wireless sensor networks (WSNs). Since the predominant traffic pattern in data gathering services is m...
Rong Zheng, Richard J. Barton
DCOSS
2005
Springer
15 years 3 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
IWSOS
2007
Springer
15 years 3 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...
WS
2006
ACM
15 years 3 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...