Sciweavers

2282 search results - page 68 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
SECON
2008
IEEE
15 years 10 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
SRDS
2008
IEEE
15 years 10 months ago
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a v...
Roberto Di Pietro, Di Ma, Claudio Soriente, Gene T...
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 8 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 10 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
PEWASUN
2008
ACM
15 years 5 months ago
Source traffic modeling in wireless sensor networks for target tracking
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Qinghua Wang, Tingting Zhang