Sciweavers

802 search results - page 69 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
ICCCN
2008
IEEE
15 years 6 months ago
Multi-Modal Target Tracking Using Heterogeneous Sensor Networks
Abstract— The paper describes a target tracking system running on a Heterogeneous Sensor Network (HSN) and presents results gathered from a realistic deployment. The system fuses...
Manish Kushwaha, Isaac Amundson, Péter V&ou...
TON
2008
121views more  TON 2008»
14 years 11 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru
COMCOM
2006
79views more  COMCOM 2006»
14 years 11 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
TSP
2008
131views more  TSP 2008»
14 years 11 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
ALGOSENSORS
2004
Springer
15 years 5 months ago
On the Computational Complexity of Sensor Network Localization
Determining the positions of the sensor nodes in a network is essential to many network functionalities such as routing, coverage and tracking, and event detection. The localizatio...
James Aspnes, David Kiyoshi Goldenberg, Yang Richa...