Sciweavers

215 search results - page 22 / 43
» Time synchronization attacks in sensor networks
Sort
View
OSDI
2006
ACM
16 years 1 days ago
Fidelity and Yield in a Volcano Monitoring Sensor Network
We present a science-centric evaluation of a 19-day sensor network deployment at Reventador, an active volcano in Ecuador. Each of the 16 sensors continuously sampled seismic and ...
Geoffrey Werner-Allen, Konrad Lorincz, Jeff Johnso...
GLOBECOM
2007
IEEE
15 years 6 months ago
A Geometric Approach to Slot Alignment in Wireless Sensor Networks
— Traditionally, slotted communication protocols have employed guard times to delineate and align slots. These guard times may expand the slot duration significantly, especially...
Niky Riga, Ibrahim Matta, Azer Bestavros
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy
SASN
2006
ACM
15 years 5 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
ESAS
2005
Springer
15 years 5 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...