Sciweavers

2282 search results - page 74 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
SENSYS
2010
ACM
15 years 2 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh
ICWN
2010
15 years 2 months ago
Efficient Cluster Head Election in Surveillance Reconnaissance Sensor Network
- Using a wireless sensor network, variety applications are being developed. In this paper, considering the field of military surveillance and reconnaissance sensors in the network...
Young Bag Moon, Nae Soo Kim, Cheol Sig Pyo, Keun W...
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 5 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
SASN
2005
ACM
15 years 10 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel