Sciweavers

1463 search results - page 164 / 293
» Securing Wireless Mesh Networks
Sort
View
JNW
2007
132views more  JNW 2007»
13 years 10 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
CN
2006
127views more  CN 2006»
13 years 10 months ago
A survey on communication networks for electric system automation
In today' s competitive electric utility marketplace, real-time information becomes the key factor for reliable delivery of power to the end-users, profitability of the electr...
Vehbi C. Gungor, Frank C. Lambert
EJWCN
2010
237views more  EJWCN 2010»
13 years 5 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
SASN
2006
ACM
14 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
12 years 6 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...