Sciweavers

2282 search results - page 272 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 11 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
TDSC
2010
102views more  TDSC 2010»
15 years 3 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 11 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
IPSN
2007
Springer
15 years 11 months ago
Health monitoring of civil infrastructures using wireless sensor networks
A Wireless Sensor Network (WSN) for Structural Health Monitoring (SHM) is designed, implemented, deployed and tested on the 4200ft long main span and the south tower of the Golden...
Sukun Kim, Shamim Pakzad, David E. Culler, James D...
ACIIDS
2009
IEEE
215views Database» more  ACIIDS 2009»
15 years 7 months ago
Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...