Sciweavers

769 search results - page 38 / 154
» Building Intrusion Detection with a Wireless Sensor Network
Sort
View
176
Voted
ICNP
2009
IEEE
15 years 1 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
255
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
GLOBECOM
2008
IEEE
15 years 4 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi
142
Voted
GISCIENCE
2008
Springer
186views GIS» more  GISCIENCE 2008»
15 years 4 months ago
Detecting Topological Change Using a Wireless Sensor Network
Dynamic geographic phenomena, such as forest fires and oil spills, can have dire environmental, sociopolitical, and economic consequences. Mitigating, if not preventing such events...
Christopher Farah, Cheng Zhong, Michael F. Worboys...
143
Voted
ICWN
2010
15 years 1 months ago
Efficient Cluster Head Election in Surveillance Reconnaissance Sensor Network
- Using a wireless sensor network, variety applications are being developed. In this paper, considering the field of military surveillance and reconnaissance sensors in the network...
Young Bag Moon, Nae Soo Kim, Cheol Sig Pyo, Keun W...