While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...