Sciweavers

4189 search results - page 571 / 838
» On the Security of Wireless Sensor Networks
Sort
View
MOBIHOC
2007
ACM
15 years 10 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
RTSS
2003
IEEE
15 years 4 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
INFOCOM
2008
IEEE
15 years 5 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
98
Voted
DCOSS
2011
Springer
13 years 11 months ago
Compiling business process models for sensor networks
—Wireless sensor networks are increasingly being used to improve business processes. The behavior of such a process is usually captured in models while its implementation is typi...
Alexandra Caracas, Alexander Bernauer
FBIT
2007
IEEE
15 years 5 months ago
Adaptive Data Dissemination in Sensor Networks Using WPDD
In Wireless Sensor Networks (WSNs), address-based routing approaches often lead to severe problems due to node mobility, energy-saving sleep-cycles, and often missing or unreliabl...
Falko Dressler, Reinhard German, Bettina Krüg...