Sciweavers

1087 search results - page 89 / 218
» Secure Tracking in Sensor Networks
Sort
View
IJSN
2006
76views more  IJSN 2006»
14 years 10 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
ALGOSENSORS
2007
Springer
14 years 11 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
ATAL
2008
Springer
14 years 12 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
IPSN
2003
Springer
15 years 3 months ago
Multi-target Sensor Management Using Alpha-Divergence Measures
This paper presents a sensor management scheme based on maximizing the expected R´enyi Information Divergence at each sample, applied to the problem of tracking multiple targets. ...
Christopher M. Kreucher, Keith Kastella, Alfred O....
SASN
2006
ACM
15 years 4 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock