— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
This paper presents a novel motion detection scheme by using the Momentum of Received Signal Strength (MRSS) to improve the quality of handoff in a general wireless network. MRSS ...
Tein-Yaw Chung, Chih-Hung Hsu, Yung-Mu Chen, K. Ro...
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
This study examines the problem of target detection by a wireless sensor network. Sensors acquire measurements emitted from the target that are corrupted by noise and initially ma...
Natallia Katenka, Elizaveta Levina, George Michail...