Sciweavers

361 search results - page 29 / 73
» Attack Detection in Wireless Localization
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 8 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
ADHOCNOW
2003
Springer
14 years 1 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
INFOCOM
2006
IEEE
14 years 2 months ago
Optimal Distributed Detection in Clustered Wireless Sensor Networks: The Weighted Median
− In a clustered, multi-hop sensor network, a large number of inexpensive, geographically-distributed sensor nodes each use their observations of the environment to make local ha...
Qingjiang Tian, Edward J. Coyle
ICWN
2010
13 years 6 months ago
Detecting and Labelling Wireless Community Network Structures from Eigen-spectra
Wireless and ad hoc networks often have local regions of highly intra-connected modules or communities of nodes against a backdrop of sparser longer-range intercommunity connectiv...
Ken A. Hawick
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 3 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw