Sciweavers

3426 search results - page 584 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
DCOSS
2006
Springer
15 years 7 months ago
GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
Lujun Jia, Guevara Noubir, Rajmohan Rajaraman, Rav...
ATAL
2009
Springer
15 years 10 months ago
A sensor middleware and agent-based communication platform for supply-chain management
We present a supply-chain management system that supports transportation of cargo containers and monitors the quality of control during transport. Our system primarily focuses on ...
Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen V...
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
141
Voted
SECON
2007
IEEE
15 years 9 months ago
A SoC-based Sensor Node: Evaluation of RETOS-enabled CC2430
—Recent progress in Wireless Sensor Networks technology has enabled many complicated real-world applications. Some of the applications demand a non-trivial amount of computation;...
Sukwon Choi, Hojung Cha, SungChil Cho
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia