Sciweavers

736 search results - page 64 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 4 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
TWC
2008
193views more  TWC 2008»
14 years 9 months ago
Coverage for target localization in wireless sensor networks
Target tracking and localization are important applications in wireless sensor networks. Although the coverage problem for target detection has been intensively studied, few consi...
Wei Wang 0002, Vikram Srinivasan, Bang Wang, Kee C...
WS
2005
ACM
15 years 3 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
DFT
2005
IEEE
178views VLSI» more  DFT 2005»
15 years 3 months ago
Inter-Plane Via Defect Detection Using the Sensor Plane in 3-D Heterogeneous Sensor Systems
Defect and fault tolerance is being studied in a 3D Heterogeneous Sensor using a stacked chip with sensors located on the top plane, and inter-plane vias connecting these to other...
Glenn H. Chapman, Vijay K. Jain, Shekhar Bhansali