Sciweavers

736 search results - page 76 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
EWSN
2004
Springer
15 years 9 months ago
Context-Aware Sensors
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Eiman Elnahrawy, Badri Nath
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
IAW
2003
IEEE
15 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
MOBIHOC
2007
ACM
15 years 9 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
ICNP
2003
IEEE
15 years 3 months ago
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
Wei-Peng Chen, Jennifer C. Hou, Lui Sha