Sciweavers

914 search results - page 154 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
AINA
2007
IEEE
14 years 2 months ago
Collaborative Signal Reinforcement in Sensor Networks
Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, ca...
Tingting Meng, Peter M. Athanas
ICDCS
2005
IEEE
14 years 1 months ago
A Spatiotemporal Query Service for Mobile Users in Sensor Networks
This paper presents MobiQuery, a spatiotemporal query service that allows mobile users to periodically gather information from their surrounding areas through a wireless sensor ne...
Chenyang Lu, Guoliang Xing, Octav Chipara, Chien-L...
PAKDD
2007
ACM
184views Data Mining» more  PAKDD 2007»
14 years 1 months ago
Exploring Group Moving Pattern for an Energy-Constrained Object Tracking Sensor Network
In this paper, we investigate and utilize the characteristic of the group movement of objects to achieve energy conservation in the inherently resource-constrained wireless object ...
Hsiao-Ping Tsai, De-Nian Yang, Wen-Chih Peng, Ming...
CCN
2006
278views Communications» more  CCN 2006»
13 years 9 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis