Sciweavers

802 search results - page 35 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
CEC
2007
IEEE
15 years 4 months ago
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
— A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices are expected to operate autonomously, be batte...
Martin Drozda, Sven Schaust, Helena Szczerbicka
IEEEIAS
2008
IEEE
15 years 4 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
IJDSN
2006
114views more  IJDSN 2006»
14 years 9 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
RAID
2000
Springer
15 years 1 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
INFOCOM
2011
IEEE
14 years 1 months ago
QoF: Towards comprehensive path quality measurement in wireless sensor networks
Abstract—Due to its large scale and constrained communication radius, a wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet along a sequence...
Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He