Sciweavers

368 search results - page 4 / 74
» Detecting Anomaly Node Behavior in Wireless Sensor Networks
Sort
View
SNPD
2007
13 years 8 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
INFOCOM
2007
IEEE
14 years 28 days ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 1 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 3 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
GLOBECOM
2008
IEEE
14 years 1 months ago
On Relay Nodes Deployment for Distributed Detection in Wireless Sensor Networks
—In this paper, the problem of deploying relay nodes in wireless sensor networks will be considered. A system consisting of a set of sensor nodes communicating to a fusion center...
Karim G. Seddik, K. J. Ray Liu