Sciweavers

361 search results - page 17 / 73
» Attack Detection in Wireless Localization
Sort
View
145
Voted
MOBILIGHT
2010
14 years 9 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
122
Voted
JPDC
2006
129views more  JPDC 2006»
15 years 2 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
117
Voted
FTDCS
2004
IEEE
15 years 6 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
101
Voted
MOBISYS
2009
ACM
16 years 3 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
117
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 2 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das