Sciweavers

27 search results - page 4 / 6
» PDA: Passive distributed assertions for sensor networks
Sort
View
IFIP
2007
Springer
15 years 3 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
IPSN
2010
Springer
15 years 4 months ago
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs ...
Raimondas Sasnauskas, Olaf Landsiedel, Muhammad Ha...
ICPADS
2008
IEEE
15 years 4 months ago
UDB: Using Directional Beacons for Localization in Underwater Sensor Networks
Underwater Sensor Networks (UWSN) are widely used in many applications, such as oceanic resource exploration, pollution monitoring, tsunami warnings and mine reconnaissance. In UW...
Hanjiang Luo, Yiyang Zhao, Zhongwen Guo, Siyuan Li...
SIGMOD
2003
ACM
140views Database» more  SIGMOD 2003»
15 years 9 months ago
The Design of an Acquisitional Query Processor For Sensor Networks
We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is...
Samuel Madden, Michael J. Franklin, Joseph M. Hell...
DCOSS
2008
Springer
14 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig