Sciweavers

361 search results - page 39 / 73
» Attack Detection in Wireless Localization
Sort
View
ICCCN
2007
IEEE
14 years 3 months ago
Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
—A robust filter-based approach is proposed for wireless sensor networks for detecting contours of a signal distribution over a 2-dimensional region. The motivation for contour d...
Hadi Alasti, William A. Armstrong, Asis Nasipuri
INFOCOM
2006
IEEE
14 years 2 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
INFOCOM
2012
IEEE
11 years 11 months ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
CORR
2007
Springer
148views Education» more  CORR 2007»
13 years 8 months ago
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
—In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter ...
Xin Zhang, H. Vincent Poor, Mung Chiang