Sciweavers

736 search results - page 36 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
TMC
2012
13 years 3 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TMC
2010
210views more  TMC 2010»
14 years 8 months ago
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Rui Tan, Guoliang Xing, Jianping Wang, Hing-Cheung...
IPSN
2010
Springer
15 years 4 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
BSN
2009
IEEE
157views Sensor Networks» more  BSN 2009»
15 years 2 months ago
Towards Self-Healing in Wireless Sensor Networks
— Faults in WSN are very common and appear in different levels of the system. For pervasive applications to be adopted by end-users there is a need for autonomic selfhealing. Thi...
Themistoklis Bourdenas, Morris Sloman