Sciweavers

209 search results - page 15 / 42
» Sensor Network Configuration Under Physical Attacks
Sort
View
WSC
2007
15 years 3 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
WISEC
2010
ACM
15 years 4 months ago
Effectiveness of distance-decreasing attacks against impulse radio ranging
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer ...
Manuel Flury, Marcin Poturalski, Panos Papadimitra...
EMNETS
2007
15 years 1 months ago
PermaSense: investigating permafrost with a WSN in the Swiss Alps
Currently, there is a lack of stand-alone geo-monitoring systems for harsh environments that are easy to configure, deploy and manage, while at the same time adhering to science g...
Igor Talzi, Andreas Hasler, Stephan Gruber, Christ...
TON
2008
133views more  TON 2008»
14 years 9 months ago
Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks
An optimal routing and data aggregation scheme for wireless sensor networks is proposed in this paper. The objective is to maximize the network lifetime by jointly optimizing data ...
Cunqing Hua, Tak-Shing Peter Yum
INFOCOM
2009
IEEE
15 years 4 months ago
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
—Distributed sensor data storage and retrieval has gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more ...
Shucheng Yu, Kui Ren, Wenjing Lou