Sciweavers

736 search results - page 126 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
JPDC
2007
77views more  JPDC 2007»
14 years 9 months ago
Location-centric storage for safety warning based on roadway sensor networks
We propose a novel vision for roadway safety warning based on sensor networks, aiming at providing user-friendly zero-delay safety warnings to motorists. Our idea leverages the ad...
Kai Xing, Xiuzhen Cheng, Fang Liu, Shmuel Rotenstr...
75
Voted
ICOST
2007
Springer
15 years 3 months ago
Distributed Vision-Based Accident Management for Assisted Living
We consider the problem of assisting vulnerable people and their carers to reduce the occurrence, and concomitant consequences, of accidents in the home. A wireless sensor network ...
Hamid K. Aghajan, Juan Carlos Augusto, Chen Wu, Pa...
ICDCSW
2006
IEEE
15 years 3 months ago
Fair Dice: A Tilt and Motion-Aware Cube with a Conscience
As an example of digital augmentation of a tiny object, a small cube-sized die is presented that perceives and records what face it rolls on. It is thus able to detect bias and co...
Kristof Van Laerhoven, Hans-Werner Gellersen
CONEXT
2008
ACM
14 years 11 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
SAC
2011
ACM
14 years 13 days ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider