Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
This work addresses the problem of detecting and classifying the interaction between two subjects. While the use of Wireless Sensor Networks (WSN) for human action detection has b...
Ruzena Bajcsy, Alessandro Borri, Maria Domenica Di...