Sciweavers

260 search results - page 49 / 52
» Secure Time Synchronization in Sensor Networks
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
SMC
2007
IEEE
129views Control Systems» more  SMC 2007»
14 years 3 months ago
Using micro-climate sensing to enhance RF localization in assisted living environments
In this paper, we propose micro-climate sensing as an effective means of enhancing conventional RF-based localization. Our system targets people tracking applications in dynamic i...
Anthony Rowe, Zane Starr, Raj Rajkumar
SASN
2003
ACM
14 years 2 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
HYBRID
2010
Springer
14 years 3 months ago
On integration of event-based estimation and robust MPC in a feedback loop
The main purpose of event-based control, if compared to periodic control, is to minimize data transfer or processing power in networked control systems. Current methods have an (i...
Joris Sijs, Mircea Lazar, W. P. M. H. Heemels
ACSAC
2007
IEEE
14 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...