Sciweavers

74 search results - page 10 / 15
» Detecting Wormhole Attacks in Wireless Networks Using Connec...
Sort
View
PEWASUN
2004
ACM
14 years 2 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
IWIA
2005
IEEE
14 years 2 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 3 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
14 years 1 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...
IPPS
2010
IEEE
13 years 6 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...