Sciweavers

368 search results - page 18 / 74
» Distributed deviation detection in sensor networks
Sort
View
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
INFOCOM
2010
IEEE
13 years 5 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao
ICNP
2009
IEEE
14 years 2 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 9 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke