Sciweavers

376 search results - page 5 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
JSAC
2006
121views more  JSAC 2006»
13 years 7 months ago
Secure localization and authentication in ultra-wideband sensor networks
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu
GLOBECOM
2006
IEEE
14 years 1 months ago
Online Calibration of Path Loss Exponent in Wireless Sensor Networks
— The path loss exponent (PLE) is a parameter indicating the rate at which the received signal strength (RSS) decreases with distance, and its value depends on the specific prop...
Guoqiang Mao, Brian D. O. Anderson, Baris Fidan
IPPS
2006
IEEE
14 years 1 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
EWSN
2004
Springer
14 years 7 months ago
Max-Min Length-Energy-Constrained Routing in Wireless Sensor Networks
We consider the problem of inter-cluster routing between cluster heads via intermediate sensor nodes in a hierarchical sensor network. Sensor nodes having limited and unreplenishab...
Rajgopal Kannan, Lydia Ray, Ramaraju Kalidindi, S....
CSFW
2007
IEEE
14 years 1 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...