Sciweavers

309 search results - page 53 / 62
» Network Performance Anomaly Detection and Localization
Sort
View
RTSS
2003
IEEE
15 years 2 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
JSAC
2011
191views more  JSAC 2011»
14 years 4 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
ENTCS
2006
173views more  ENTCS 2006»
14 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
LCN
2008
IEEE
15 years 3 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
GSN
2009
Springer
140views Sensor Networks» more  GSN 2009»
15 years 2 months ago
Estimation of Pollutant-Emitting Point-Sources Using Resource-Constrained Sensor Networks
We present an algorithm that makes an appropriate use of a Kalman filter combined with a geometric computation with respect to the localisation of a pollutant-emitting point sourc...
Michael Zoumboulakis, George Roussos