Sciweavers

802 search results - page 88 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
TWC
2008
113views more  TWC 2008»
14 years 9 months ago
Two-dimensional coded classification schemes in wireless sensor networks
Abstract-- This work proposes a novel fault-tolerant classification system based on distributed detection and two-dimensional channel coding. A rule is then derived to reduce the s...
Hung-Ta Pai, Yunghsiang S. Han, Jing-Tian Sung
IPSN
2003
Springer
15 years 3 months ago
Sentry-Based Power Management in Wireless Sensor Networks
This paper presents a sentry-based approach to power management in wireless sensor networks for applications such as intruder detection and tracking. To minimize average power cons...
Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh
GLOBECOM
2008
IEEE
15 years 4 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
EMNETS
2007
15 years 1 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic