Sciweavers

802 search results - page 56 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
ICRA
2006
IEEE
145views Robotics» more  ICRA 2006»
15 years 3 months ago
Instrumenting Wireless Sensor Networks for Real-time Surveillance
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...
ANSS
2007
IEEE
15 years 4 months ago
Scalable Data Collection Protocols for Wireless Sensor Networks with Multiple Mobile Sinks
Data propagation in wireless sensor networks is usually performed as a multihop process. To deliver a single message, the resources of many sensor nodes are used and a lot of ener...
Athanasios Kinalis, Sotiris E. Nikoletseas
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 4 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
AINA
2009
IEEE
15 years 2 months ago
Differences and Commonalities of Service-Oriented Device Architectures, Wireless Sensor Networks and Networks-on-Chip
Device centric Service-oriented Architectures have shown to be applicable in the automation industry for interconnecting manufacturing devices and enterprise systems, thus, establ...
Guido Moritz, Claas Cornelius, Frank Golatowski, D...
DCOSS
2005
Springer
15 years 3 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...