Sciweavers

625 search results - page 39 / 125
» Image Change Detection Using Wireless Sensor Networks
Sort
View
WS
2006
ACM
15 years 4 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
SAINT
2008
IEEE
15 years 4 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
LCN
2008
IEEE
15 years 4 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
MOBICOM
2005
ACM
15 years 3 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
TSMC
2010
14 years 4 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...