Sciweavers

798 search results - page 53 / 160
» Detecting Topological Change Using a Wireless Sensor Network
Sort
View
IJSNET
2006
129views more  IJSNET 2006»
14 years 11 months ago
Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks
Recently, wireless sensor networks have been widely discussed in many applications. In this paper, we propose a novel 3D emergency service that aims to guide people to safe places...
Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song
IJSNET
2010
122views more  IJSNET 2010»
14 years 10 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
SENSYS
2005
ACM
15 years 5 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
IPPS
2006
IEEE
15 years 5 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao