Sciweavers

2282 search results - page 410 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 8 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
INFOCOM
2010
IEEE
15 years 13 days ago
Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices—such as wireless microphones (WMs)— is a challenging, but very important, problem that has n...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
ACII
2005
Springer
15 years 7 months ago
The HandWave Bluetooth Skin Conductance Sensor
HandWave is a small, wireless, networked skin conductance sensor for affective computing applications. It is used to detect information related to emotional, cognitive, and physica...
Marc Strauss, Carson Reynolds, Stephen Hughes, Kyo...
MOBISYS
2007
ACM
16 years 1 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 8 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw