Sciweavers

736 search results - page 113 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
COMCOM
2006
100views more  COMCOM 2006»
14 years 9 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 8 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
ICDCS
2010
IEEE
14 years 10 months ago
Link-Centric Probabilistic Coverage Model for Transceiver-Free Object Detection in Wireless Networks
Abstract--Sensing coverage is essential for most applications in wireless networks. In traditional coverage problem study, the disk coverage model has been widely applied because o...
Dian Zhang, Yunhuai Liu, Lionel M. Ni
IPSN
2009
Springer
15 years 4 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam
ICCCN
2008
IEEE
15 years 4 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar