Sciweavers

527 search results - page 34 / 106
» Intrusion Detection in Wireless Sensor Networks
Sort
View

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ICRA
2006
IEEE
145views Robotics» more  ICRA 2006»
14 years 2 months ago
Instrumenting Wireless Sensor Networks for Real-time Surveillance
— This paper considers the problem of tracking an unknown number of targets using a wireless sensor network for surveillance. In particular, we consider the case in which each se...
Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar ...
PERCOM
2009
ACM
14 years 3 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
DCOSS
2005
Springer
14 years 2 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
IWSOS
2007
Springer
14 years 2 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...