Sciweavers

6122 search results - page 191 / 1225
» Securing network access in wireless sensor networks
Sort
View
TPDS
2008
167views more  TPDS 2008»
15 years 4 months ago
Algorithms for Fault-Tolerant Topology in Heterogeneous Wireless Sensor Networks
This paper addresses fault-tolerant topology control in a heterogeneous wireless sensor network consisting of several resource-rich supernodes, used for data relaying, and a large...
Mihaela Cardei, Shuhui Yang, Jie Wu
ACMSE
2004
ACM
15 years 10 months ago
Security for fixed sensor networks
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging pro...
Ning Hu, Randy K. Smith, Phillip G. Bradford
IMC
2007
ACM
15 years 6 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
SASN
2004
ACM
15 years 10 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
ICC
2007
IEEE
340views Communications» more  ICC 2007»
15 years 11 months ago
A Decentralized Positioning Method for Wireless Sensor Networks Based on Weighted Interpolation
— A decentralized sensor positioning algorithm is proposed using an adaptive weighted-interpolation method. The proposed method utilizes in-network processing among sensors to co...
Chin-Liang Wang, Yao-Win Hong, Yu-Sheng Dai