Sciweavers

659 search results - page 117 / 132
» Anomaly intrusion detection in wireless sensor networks
Sort
View
SAINT
2009
IEEE
14 years 2 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
MOBICOM
2004
ACM
14 years 25 days ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 2 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
ICDCS
2012
IEEE
11 years 9 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...
ISCAS
2006
IEEE
169views Hardware» more  ISCAS 2006»
14 years 1 months ago
An Address-Event Image Sensor Network
We discuss an imaging architecture for sensor pixel in the ALOHA signals an event when a certain amount network applications, that employs a 32 x 32 Address-Event of photons are re...
Thiago Teixeira, Eugenio Culurciello, Andreas G. A...