Sciweavers

802 search results - page 89 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
TMC
2012
13 years 6 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 4 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
15 years 2 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...
INFOCOM
2009
IEEE
15 years 4 months ago
Passive Loss Inference in Wireless Sensor Networks Based on Network Coding
Abstract—The highly stochastic nature of wireless environments makes it desirable to monitor link loss rates in wireless sensor networks. In this paper, we study the loss inferen...
Yunfeng Lin, Ben Liang, Baochun Li
PERCOM
2010
ACM
14 years 8 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang