Sciweavers

802 search results - page 69 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
ICCCN
2008
IEEE
15 years 4 months ago
Multi-Modal Target Tracking Using Heterogeneous Sensor Networks
Abstract— The paper describes a target tracking system running on a Heterogeneous Sensor Network (HSN) and presents results gathered from a realistic deployment. The system fuses...
Manish Kushwaha, Isaac Amundson, Péter V&ou...
TON
2008
121views more  TON 2008»
14 years 9 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru
COMCOM
2006
79views more  COMCOM 2006»
14 years 9 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
TSP
2008
131views more  TSP 2008»
14 years 9 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
ALGOSENSORS
2004
Springer
15 years 3 months ago
On the Computational Complexity of Sensor Network Localization
Determining the positions of the sensor nodes in a network is essential to many network functionalities such as routing, coverage and tracking, and event detection. The localizatio...
James Aspnes, David Kiyoshi Goldenberg, Yang Richa...