Sciweavers

215 search results - page 40 / 43
» Time synchronization attacks in sensor networks
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
RAID
2001
Springer
15 years 4 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
PERCOM
2007
ACM
15 years 11 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
TMC
2011
119views more  TMC 2011»
14 years 6 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
MASS
2010
143views Communications» more  MASS 2010»
14 years 9 months ago
Know your neighborhood: A strategy for energy-efficient communication
Wireless sensor networks typically conserve energy by following a periodic wakeup-sleep schedule: nodes minimize idle time and spend most of their time in a low power sleep state. ...
Farhana Ashraf, Riccardo Crepaldi, Robin Kravets