Sciweavers

2282 search results - page 438 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
MOBICOM
2010
ACM
13 years 8 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
IWIA
2005
IEEE
14 years 2 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
IFIP
2007
Springer
14 years 2 months ago
Enhancing IEEE 802.11n WLANs using group-orthogonal code-division multiplex
The definition of the next generation of wireless networks is well under way within the IEEE 802.11 High Throughput Task Group committee. The resulting standard, to be called IEEE...
Guillem Femenias, Felip Riera-Palou
KI
2007
Springer
14 years 2 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox