To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...