Sciweavers

1129 search results - page 98 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
15 years 4 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin
WIMOB
2008
IEEE
15 years 4 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 4 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
IPSN
2005
Springer
15 years 3 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du