Sciweavers

802 search results - page 64 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
14 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
JSAC
2010
86views more  JSAC 2010»
14 years 8 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 4 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
BSN
2009
IEEE
147views Sensor Networks» more  BSN 2009»
15 years 1 months ago
Classification of Physical Interactions between Two Subjects
This work addresses the problem of detecting and classifying the interaction between two subjects. While the use of Wireless Sensor Networks (WSN) for human action detection has b...
Ruzena Bajcsy, Alessandro Borri, Maria Domenica Di...
IWCMC
2006
ACM
15 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu