Sciweavers

173 search results - page 9 / 35
» Detecting selective forwarding attacks in wireless sensor ne...
Sort
View
TMC
2008
109views more  TMC 2008»
13 years 8 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
MOBIHOC
2005
ACM
14 years 8 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
IFIP12
2009
13 years 6 months ago
Use of AI Techniques for Residential Fire Detection in Wireless Sensor Networks
: Early residential fire detection is important for prompt extinguishing and reducing damages and life losses. To detect fire, one or a combination of sensors and a detection algor...
Majid Bahrepour, Nirvana Meratnia, Paul J. M. Havi...
IJSNET
2007
91views more  IJSNET 2007»
13 years 8 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
PERCOM
2006
ACM
14 years 8 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra