Sciweavers

736 search results - page 38 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
14 years 11 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
TMC
2011
108views more  TMC 2011»
14 years 4 months ago
Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
—Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while ...
Changlei Liu, Guohong Cao
EURONGI
2008
Springer
14 years 11 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...
JNSM
2008
93views more  JNSM 2008»
14 years 9 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
IEEECIT
2010
IEEE
14 years 8 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang