Sciweavers

196 search results - page 14 / 40
» Self Location Estimation Scheme Using ROA in Wireless Sensor...
Sort
View
GIS
2008
ACM
14 years 7 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 1 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
WISEC
2010
ACM
14 years 2 days ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
TSP
2008
103views more  TSP 2008»
13 years 6 months ago
Distributed Adaptive Quantization for Wireless Sensor Networks: From Delta Modulation to Maximum Likelihood
Abstract-- We consider distributed parameter estimation using quantized observations in wireless sensor networks where due to bandwidth constraint, each sensor quantizes its local ...
Jun Fang, Hongbin Li
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 6 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau