Sciweavers

736 search results - page 118 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
CISS
2008
IEEE
15 years 4 months ago
A distributed scheme for detection of information flows
—Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in th...
Ameya Agaskar, Lang Tong, Ting He
CISS
2008
IEEE
15 years 4 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
RTCSA
2005
IEEE
15 years 3 months ago
Embedded Sensing of Structures: A Reality Check
With the advent of miniaturized sensing technology, it has become possible to envision smart structures containing millions of sensors embedded in concrete for autonomously detect...
Krishna Chintalapudi, Jeongyeup Paek, Nupur Kothar...
MOBISYS
2007
ACM
15 years 9 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...
WONS
2012
IEEE
13 years 5 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...