Sciweavers

1087 search results - page 103 / 218
» Secure Tracking in Sensor Networks
Sort
View
ESAS
2007
Springer
15 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
AINA
2009
IEEE
15 years 11 days ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
ICASSP
2011
IEEE
14 years 1 months ago
Distributed Gaussian particle filtering using likelihood consensus
We propose a distributed implementation of the Gaussian particle filter (GPF) for use in a wireless sensor network. Each sensor runs a local GPF that computes a global state esti...
Ondrej Hlinka, Ondrej Sluciak, Franz Hlawatsch, Pe...
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 4 months ago
Interplay Between Routing and Distributed Source Coding in Wireless Sensor Network
—Recent Advances in Distributed Source Coding (DSC) for mission-driven Wireless Sensor Networks (WSN) are related to the coding for multiple correlated sensors in applications su...
Honggang Wang, Dongming Peng, Wei Wang 0015, Hamid...
CORR
2010
Springer
159views Education» more  CORR 2010»
14 years 10 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa