Sciweavers

2189 search results - page 6 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
PERCOM
2005
ACM
14 years 2 months ago
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In th...
Atul Verma, Hemjit Sawant, Jindong Tan
MOBISYS
2007
ACM
14 years 8 months ago
NodeMD: diagnosing node-level faults in remote wireless sensor systems
Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root cause...
Veljko Krunic, Eric Trumpler, Richard Han
IPCCC
2007
IEEE
14 years 2 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 3 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran