Sciweavers

895 search results - page 59 / 179
» Outlier detection in sensor networks
Sort
View
SRDS
2007
IEEE
14 years 2 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
HPCC
2007
Springer
14 years 2 months ago
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
JSAC
2010
188views more  JSAC 2010»
13 years 3 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
JCST
2008
102views more  JCST 2008»
13 years 8 months ago
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks
Abstract--We study Random and Periodic sleep schedules from the point of view of delay in detecting the target. We consider sleep schedules in which a sensor in `inactive' mod...
Vaishali P. Sadaphal, Bijendra N. Jain
VTC
2007
IEEE
133views Communications» more  VTC 2007»
14 years 2 months ago
Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks
—Localization is a critical issue in wireless sensor networks. In most localization schemes, there are beacons being placed as references to determine the positions of objects or...
Sheng-Po Kuo, Hsiao-Ju Kuo, Yu-Chee Tseng, Yueh-Fe...