Sciweavers

802 search results - page 57 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
IWSOS
2007
Springer
15 years 3 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...
INFOCOM
2008
IEEE
15 years 4 months ago
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
—In wireless ad-hoc sensor networks, an important issue often faced in geographic greedy forwarding routing is the “local minimum phenomenon” which is caused by deployment ho...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
WS
2006
ACM
15 years 3 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 4 months ago
Efficient Coverage Planning for Grid-Based Wireless Sensor Networks
- In this paper we study efficient triangular grid-based sensor deployment planning for coverage when sensor placements are perturbed by random errors around their corresponding gr...
Glen Takahara, Kenan Xu, Hossam S. Hassanein
RAID
2007
Springer
15 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang