Sciweavers

802 search results - page 19 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
MOBIHOC
2008
ACM
14 years 7 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
ISCC
2006
IEEE
182views Communications» more  ISCC 2006»
14 years 1 months ago
CollECT: Collaborative Event deteCtion and Tracking in Wireless Heterogeneous Sensor Networks
Event detection and tracking are attractive research issues in the wireless sensor network (WSN). The paper proposes a fully distributed protocol, CollECT, to event detection and ...
Kuei-Ping Shih, Sheng-Shih Wang, Pao-Hwa Yang, Cha...
ICWN
2009
13 years 5 months ago
Wireless Sensor Network for Landslide Detection
Abstract-- The power of wireless sensor network techonology has provided the capability of developing large scale systems for real-time monitoring.This paper describes the evolutio...
Maneesha V. Ramesh, Sangeeth Kumar, P. Venkat Rang...
AUTONOMICS
2008
ACM
13 years 9 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...