Sciweavers

1087 search results - page 151 / 218
» Secure Tracking in Sensor Networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 4 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
ADHOC
2007
109views more  ADHOC 2007»
14 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
DCOSS
2006
Springer
15 years 1 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
CCS
2009
ACM
15 years 4 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
ICPR
2010
IEEE
15 years 4 months ago
Sensor Fusion for Cooperative Head Localization
—In modern video surveillance systems, pan–tilt– zoom (PTZ) cameras certainly have the potential to allow the coverage of wide areas with a much smaller number of sensors, co...
Alberto Del Bimbo, Fabrizio Dini, Giuseppe Lisanti...