Sciweavers

914 search results - page 69 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
EWSN
2008
Springer
14 years 7 months ago
Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
X. Rosalind Wang, Joseph T. Lizier, Oliver Obst, M...
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
MONET
2006
173views more  MONET 2006»
13 years 7 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
GIS
2008
ACM
14 years 9 months ago
Detecting basic topological changes in sensor networks by local aggregation
Wireless sensor networks (WSNs) can provide real-time information about geospatial environments, and so have the potential to play an important role in the monitoring of geographi...
Jixiang Jiang, Michael F. Worboys
TMC
2010
155views more  TMC 2010»
13 years 6 months ago
Maximizing the Lifetime of a Barrier of Wireless Sensors
—To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so tha...
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...