Sciweavers

1051 search results - page 64 / 211
» Secure Continuity for Sensor Networks
Sort
View
ICDCS
2008
IEEE
15 years 9 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICWN
2008
15 years 4 months ago
Reliability Challenges and Enhancement Approaches for Pipeline Sensor and Actor Networks
- Sensor and actor networks are used to monitor and control pipeline infrastructures. This paper discusses and compares different sensor and actor network architectures for water, ...
Nader Mohamed, Imad Jawhar, Khaled Shuaib
WISEC
2009
ACM
15 years 9 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt
WWW
2007
ACM
16 years 3 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham
SENSYS
2005
ACM
15 years 8 months ago
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a...
Jyh-How Huang, Saqib Amjad, Shivakant Mishra