Sciweavers

802 search results - page 44 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
JCM
2008
77views more  JCM 2008»
14 years 9 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
ICCCN
2007
IEEE
15 years 4 months ago
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
Amey Shevtekar, Nirwan Ansari
EUC
2007
Springer
15 years 1 months ago
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing
A Wireless Sensor Network (WSN) composed of tiny sensor nodes may operate in an unfavorable terrain. The coupling of inherent limitations and harsh environments makes WSNs fallible...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
FTDCS
2004
IEEE
15 years 1 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
ICC
2007
IEEE
15 years 1 months ago
Routing for Emitter/Reflector Signal Detection in Wireless Sensor Network Systems
In this paper, we consider energy-efficient routing for detection in wireless sensor networks (WSNs). Energyefficient routing for WSNs has been intensely studied recently, but rout...
Yang Yang, Rick S. Blum