Sciweavers

736 search results - page 124 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
WISEC
2010
ACM
15 years 4 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
PEWASUN
2004
ACM
15 years 3 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICDCN
2009
Springer
15 years 4 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
85
Voted
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 4 months ago
ISROBOTNET: A testbed for sensor and robot network systems
— This paper introduces a testbed for sensor and robot network systems, currently composed of 10 cameras and 5 mobile wheeled robots equipped with several sensors for self-locali...
Marco Barbosa, Alexandre Bernardino, Dario Figueir...
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
Temporary Interconnection of ZigBee Personal Area Network (PAN)
—ZigBee is popular for Wireless Sensor Network (WSN) devices because of its low power consumption, built-in security method and ratified specifications. With these features, it...
Sewook Jung, Alexander Chang, Mario Gerla