Sciweavers

736 search results - page 43 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
JCM
2008
77views more  JCM 2008»
14 years 9 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
EUC
2007
Springer
15 years 1 months ago
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing
A Wireless Sensor Network (WSN) composed of tiny sensor nodes may operate in an unfavorable terrain. The coupling of inherent limitations and harsh environments makes WSNs fallible...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
FTDCS
2004
IEEE
15 years 1 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
ICC
2007
IEEE
15 years 1 months ago
Routing for Emitter/Reflector Signal Detection in Wireless Sensor Network Systems
In this paper, we consider energy-efficient routing for detection in wireless sensor networks (WSNs). Energyefficient routing for WSNs has been intensely studied recently, but rout...
Yang Yang, Rick S. Blum