Sciweavers

2282 search results - page 35 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
SUTC
2006
IEEE
15 years 10 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
117
Voted
IPSN
2005
Springer
15 years 9 months ago
Towards optimal sleep scheduling in sensor networks for rare-event detection
— Lifetime maximization is one key element in the design of sensor-network-based surveillance applications. We propose a protocol for node sleep scheduling that guarantees a boun...
Qing Cao, Tarek F. Abdelzaher, Tian He, John A. St...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 10 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
157
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
136
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Congestion Avoidance and Fairness in Wireless Sensor Networks
—Designing a sensor network congestion avoidance algorithm is a challenging task due to the application specific nature of these networks. The frequency of event sensing is a de...
Mohammad Z. Ahmad, Damla Turgut