Sciweavers

736 search results - page 125 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
CCN
2006
278views Communications» more  CCN 2006»
14 years 11 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
GLOBECOM
2009
IEEE
15 years 4 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang
CSREASAM
2006
14 years 11 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
72
Voted
PERCOM
2010
ACM
14 years 7 months ago
Profiling sprints using on-body sensors
This paper describes the design, implementation and deployment of a wireless sensor system for athletes. The system is designed to profile sprints based on input from on-body senso...
Salman Taherian, Marcelo Pias, Robert Harle, Georg...