Sciweavers

369 search results - page 66 / 74
» Node capture attacks in wireless sensor networks: A system t...
Sort
View
SASN
2003
ACM
14 years 24 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
WONS
2012
IEEE
12 years 3 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...
INFOCOM
2006
IEEE
14 years 1 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
IROS
2009
IEEE
174views Robotics» more  IROS 2009»
14 years 2 months ago
Characterization and modeling of wireless channels for networked robotic and control systems - a comprehensive overview
— The goal of this paper is to serve as a reference for researchers in robotics and control that are interested in realistic modeling, theoretical analysis and simulation of wire...
Yasamin Mostofi, Alejandro Gonzalez-Ruiz, Alireza ...
HICSS
2005
IEEE
185views Biometrics» more  HICSS 2005»
14 years 1 months ago
HEAR-SN: A New Hierarchical Energy-Aware Routing Protocol for Sensor Networks
Wireless sensor networks are becoming an integral part of numerous applications very quickly. Here, we present a new approach for sensor applications that requires coverage for a ...
Michael Hempel, Hamid Sharif, Prasad Raviraj