Sciweavers

235 search results - page 9 / 47
» The intrusion detection in mobile sensor network
Sort
View
JHSN
2006
66views more  JHSN 2006»
14 years 9 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta
IPPS
2009
IEEE
15 years 4 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
ICNP
2003
IEEE
15 years 3 months ago
A Bidding Protocol for Deploying Mobile Sensors
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high...
Guiling Wang, Guohong Cao, Thomas F. La Porta
IJNSEC
2006
205views more  IJNSEC 2006»
14 years 9 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
PERCOM
2005
ACM
15 years 9 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...