Sciweavers

2282 search results - page 18 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
ICASSP
2010
IEEE
13 years 7 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
ICASSP
2011
IEEE
12 years 10 months ago
Robust distributed detection, localization, and estimation of a diffusive target in clustered wireless sensor networks
Robust operation of wireless sensor networks deployed in harsh environment is important in many application. In this paper, we develop a robust technique for distributed detection...
Sami Aldalahmeh, Mounir Ghogho
INFOCOM
2005
IEEE
14 years 10 days ago
RID: radio interference detection in wireless sensor networks
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...