Sciweavers

342 search results - page 12 / 69
» Distributed Detection of Node Replication Attacks in Sensor ...
Sort
View
ICNP
2003
IEEE
14 years 2 months ago
Distributed, Self-Stabilizing Placement of Replicated Resources in Emerging Networks
Emerging large scale distributed networking systems, such as P2P file sharing systems, sensor networks, and ad hoc wireless networks, require replication of content, functionalit...
Bong-Jun Ko, Dan Rubenstein
GLOBECOM
2008
IEEE
14 years 3 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun
GLOBECOM
2007
IEEE
14 years 3 months ago
Sigma-Delta ADC Based Distributed Detection in Wireless Sensor Networks
Abstract—In the existing works on distributed detection in sensor networks, local sensor nodes either quantize the observation or directly scale the analog observation and then t...
Dimeng Wang, Shuangqing Wei, Guoxiang Gu
ACSAC
2007
IEEE
14 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
JCM
2008
77views more  JCM 2008»
13 years 9 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...