Sciweavers

527 search results - page 39 / 106
» Intrusion Detection in Wireless Sensor Networks
Sort
View
101
Voted
LCN
2005
IEEE
15 years 6 months ago
Probabilistic Coverage in Wireless Sensor Networks
— The sensing capabilities of networked sensors are affected by environmental factors in real deployment and it is imperative to have practical considerations at the design stage...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
96
Voted
VTC
2007
IEEE
133views Communications» more  VTC 2007»
15 years 6 months ago
Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks
—Localization is a critical issue in wireless sensor networks. In most localization schemes, there are beacons being placed as references to determine the positions of objects or...
Sheng-Po Kuo, Hsiao-Ju Kuo, Yu-Chee Tseng, Yueh-Fe...
130
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 7 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
IPPS
2006
IEEE
15 years 6 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
104
Voted
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song