Sciweavers

368 search results - page 31 / 74
» Detecting Anomaly Node Behavior in Wireless Sensor Networks
Sort
View
IPSN
2005
Springer
14 years 8 days ago
Some sensor network elements for ubiquitous computing
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...
SECON
2010
IEEE
13 years 4 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
INFOCOM
2008
IEEE
14 years 1 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
GLOBECOM
2008
IEEE
14 years 1 months ago
Congestion Avoidance and Fairness in Wireless Sensor Networks
—Designing a sensor network congestion avoidance algorithm is a challenging task due to the application specific nature of these networks. The frequency of event sensing is a de...
Mohammad Z. Ahmad, Damla Turgut
DCOSS
2007
Springer
14 years 29 days ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...