Sciweavers

798 search results - page 95 / 160
» Detecting Topological Change Using a Wireless Sensor Network
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 8 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
MSWIM
2003
ACM
15 years 8 months ago
Connectivity of wireless multihop networks in a shadow fading environment
This article analyzes the connectivity of multihop radio networks in a log-normal shadow fading environment. Assuming the nodes have equal transmission capabilities and are randoml...
Christian Bettstetter, Christian Hartmann
CF
2005
ACM
15 years 5 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
PERCOM
2009
ACM
15 years 10 months ago
Look-ahead Geographic Routing for Sensor Networks
— As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Voids in networks often cause existing geographic routing algorithms ...
Jiaxi You, Dominik Lieckfeldt, Qi Han, Jakob Salzm...
IAT
2009
IEEE
15 years 10 months ago
Simulating BDI-Based Wireless Sensor Networks
—“Autonomic systems” merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing...
Alexis Morris, Paolo Giorgini, Sameh Abdel-Naby