Sciweavers

736 search results - page 47 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
14 years 10 months ago
Mobile Solution for Three-Tier Biofeedback Data Acquisition and Processing
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...
INFOCOM
2003
IEEE
15 years 3 months ago
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
— A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data ...
Seema Bandyopadhyay, Edward J. Coyle
JSAC
2006
156views more  JSAC 2006»
14 years 9 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ICC
2008
IEEE
162views Communications» more  ICC 2008»
15 years 4 months ago
Self-Orienting Wireless Multimedia Sensor Networks for Maximizing Multimedia Coverage
— The performance of a wireless multimedia sensor network (WMSN) is tightly coupled with the pose of individual multimedia sensors. In particular, orientation of an individual mu...
Nurcan Tezcan, Wenye Wang
CCS
2008
ACM
14 years 11 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia