Sciweavers

914 search results - page 160 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
ICC
2007
IEEE
179views Communications» more  ICC 2007»
14 years 2 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
WACV
2008
IEEE
14 years 2 months ago
Distributed Visual Processing for a Home Visual Sensor Network
deliver objects, handle emergency, wherever he/she is inside the home. In addition, the burden of processing We address issues dealing with distributed visual power can be distribu...
Kwangsu Kim, Gérard G. Medioni
PERCOM
2005
ACM
14 years 7 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
EJWCN
2010
237views more  EJWCN 2010»
13 years 2 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang