Sciweavers

464 search results - page 6 / 93
» Detecting the number of signals in wireless DS-CDMA networks
Sort
View
RAID
2005
Springer
14 years 29 days ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
PEWASUN
2005
ACM
14 years 1 months ago
Weak signal detection performance of selective rake receivers in fading channels
We derive the optimum and suboptimum selective rake receivers (SRRs) for fading environment exhibiting impulsive nature. Simulation results confirm that, when the noise is impuls...
Jinsoo Bae, Sang Won Choi, So Ryoung Park, Jongho ...
IJSNET
2011
55views more  IJSNET 2011»
12 years 11 months ago
Testing network protocols and signal attenuation in packed food transports
: Two sensor network protocols for the monitoring of packed food products were tested in different sea containers. The packet rate and the signal strength of all sensor-to-sensor l...
Reiner Jedermann, Markus Becker, Carmelita Gö...