Sciweavers

736 search results - page 40 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
ICCCN
2007
IEEE
15 years 1 months ago
Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
You-Chiun Wang, Wen-Chih Peng, Min-Hsien Chang, Yu...
92
Voted
PERCOM
2007
ACM
15 years 9 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
84
Voted
DSN
2009
IEEE
15 years 4 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
70
Voted
IPPS
2006
IEEE
15 years 3 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
AISM
2004
14 years 11 months ago
SOHO Wireless Intrusion Detection Systems - Cure or Placebo
Growth of wireless home networking solutions has meant that household computers are now not just connected to the Internet and each other but to passers-by on the street. It is th...
Peter Wolski