Sciweavers

802 search results - page 73 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya
89
Voted
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
15 years 3 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
91
Voted
ALGOSENSORS
2010
Springer
14 years 10 months ago
Monitoring Churn in Wireless Networks
Wireless networks often experience a significant amount of churn, the arrival and departure of nodes. In this paper we propose a distributed algorithm for single-hop networks that...
Stephan Holzer, Yvonne Anne Pignolet, Jasmin Smula...
MIDDLEWARE
2007
Springer
15 years 5 months ago
A node discovery service for partially mobile sensor networks
Wireless Sensor Networks (WSNs) are challenging types of networks where resources can be scarce. In particular, battery is often a very limited resource and the radio interface is...
Vladimir Dyo, Cecilia Mascolo
INFOCOM
2009
IEEE
15 years 6 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang