Sciweavers

736 search results - page 80 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
A Singlehop Collaborative Feedback Primitive for Wireless Sensor Networks
Abstract—To achieve scalability, energy-efficiency, and timeliness, wireless sensor network deployments increasingly employ in-network processing. In this paper, we identify sin...
Murat Demirbas, Onur Soysal, Muzammil Hussain
IPSN
2010
Springer
15 years 4 months ago
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs ...
Raimondas Sasnauskas, Olaf Landsiedel, Muhammad Ha...
ICASSP
2010
IEEE
14 years 10 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
CCS
2006
ACM
15 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang