Sciweavers

602 search results - page 46 / 121
» Decentralized intrusion detection in wireless sensor network...
Sort
View
COMCOM
2007
136views more  COMCOM 2007»
13 years 7 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ICRA
2006
IEEE
145views Robotics» more  ICRA 2006»
14 years 1 months ago
Instrumenting Wireless Sensor Networks for Real-time Surveillance
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...
PERCOM
2009
ACM
14 years 2 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
DCOSS
2005
Springer
14 years 1 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...