Sciweavers

173 search results - page 9 / 35
» Detecting selective forwarding attacks in wireless sensor ne...
Sort
View
166
Voted
TMC
2008
109views more  TMC 2008»
15 years 3 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
MOBIHOC
2005
ACM
16 years 3 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
131
Voted
IFIP12
2009
15 years 1 months ago
Use of AI Techniques for Residential Fire Detection in Wireless Sensor Networks
: Early residential fire detection is important for prompt extinguishing and reducing damages and life losses. To detect fire, one or a combination of sensors and a detection algor...
Majid Bahrepour, Nirvana Meratnia, Paul J. M. Havi...
146
Voted
IJSNET
2007
91views more  IJSNET 2007»
15 years 3 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
155
Voted
PERCOM
2006
ACM
16 years 3 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra