Sciweavers

802 search results - page 55 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
JSAC
2006
127views more  JSAC 2006»
14 years 9 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
ICWN
2009
14 years 7 months ago
AReIT: Adaptive Reliable Information Transport Protocol for Wireless Sensor Networks
Abstract-- The reliable delivery of services in service oriented architectures often entails the underlying basis of having well structured system and communication network models....
Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Sur...
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
SIGPRO
2008
90views more  SIGPRO 2008»
14 years 9 months ago
Some aspects of DOA estimation using a network of blind sensors
Recently, the DOA (Direction Of Arrival) estimation of an acoustic wavefront has been considered in a setting where the inference task is performed by a Wireless Sensor Network (W...
Marco Guerriero, Stefano Maranò, Vincenzo M...
MADNES
2005
Springer
15 years 3 months ago
ARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A ...
Suk-Bok Lee, Yoon-Hwa Choi