Sciweavers

361 search results - page 28 / 73
» Attack Detection in Wireless Localization
Sort
View
USENIX
2008
13 years 11 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
TWC
2008
193views more  TWC 2008»
13 years 8 months ago
Coverage for target localization in wireless sensor networks
Target tracking and localization are important applications in wireless sensor networks. Although the coverage problem for target detection has been intensively studied, few consi...
Wei Wang 0002, Vikram Srinivasan, Bang Wang, Kee C...
IEEECIT
2006
IEEE
14 years 2 months ago
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks
Localization is a basic and critical requirement for wireless sensor network applications, e.g. target tracking, monitoring and intrusion detection. In the received signal strengt...
Haoran Feng, Ruixi Yuan, Chundi Mu
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
ICIP
2006
IEEE
14 years 10 months ago
Fingerprint Liveness Detection Using Local Ridge Frequencies and Multiresolution Texture Analysis Techniques
It has been demonstrated that simple and inexpensive techniques are sufficient to spoof fingerprint scanners. Previously, effective use of physiological phenomenon of perspiration...
Aditya Abhyankar, Stephanie A. C. Schuckers