Sciweavers

422 search results - page 41 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
ASE
2005
96views more  ASE 2005»
13 years 7 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
SENSYS
2006
ACM
14 years 1 months ago
Interest dissemination with directional antennas for wireless sensor networks with mobile sinks
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
Yihong Wu, Lin Zhang, Yiqun Wu, Zhisheng Niu
WISEC
2010
ACM
14 years 2 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
WINET
2010
88views more  WINET 2010»
13 years 6 months ago
Tree-based object tracking without mobility statistics in wireless sensor networks
Object tracking in wireless sensor networks is to track mobile objects by scattered sensors. These sensors are typically organized into a tree to deliver report messages upon dete...
Li-Hsing Yen, Bang Ye Wu, Chia-Cheng Yang
MOBISYS
2007
ACM
14 years 7 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...