Sciweavers

2099 search results - page 165 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
69
Voted
TMC
2011
119views more  TMC 2011»
14 years 5 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
87
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Distributed Monitoring and Aggregation in Wireless Sensor Networks
— Self-monitoring the sensor statuses such as liveness, node density and residue energy is critical for maintaining the normal operation of the sensor network. When building the ...
Changlei Liu, Guohong Cao
70
Voted
SACMAT
2003
ACM
15 years 3 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
92
Voted
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
100
Voted
ISCAPDCS
2003
14 years 11 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko