• Nenhum resultado encontrado

[PDF] Top 20 A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

Has 10000 "A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks" found on our website. Below are the top 20 most common "A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks".

A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

... —Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all ... See full document

7

Security Attacks and its Countermeasures in Wireless Sensor  Networks

Security Attacks and its Countermeasures in Wireless Sensor Networks

... value to the time at which it receives the ...able to detect if the packet has traveled too ...used to discover neighboring nodes identified by ...each sensor are numbered 1 to N ... See full document

12

Intrusion Detection in Wireless Body Sensor Networks

Intrusion Detection in Wireless Body Sensor Networks

... Wireless sensor network (WSN) consists in utilizing homo- geneous or heterogeneous sensor nodes, capable of communi- cating wirelessly in order to forward packets ... See full document

6

MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks

MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks

... method to identify abnormal sensors and event boundaries using a local technology based on statistical Gaussian model ...used to identify errors and events found in the ecological field of ... See full document

8

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

... made to analysis various asymmetric keys algorithms ELGAMAL, RSA (Rivest Shamir Adelman), Public Key Encryption (PKE), Elliptic Curve Cryptography (ECC) which are used for key distribution as well as ... See full document

5

IMPROVING QOS UNDER DDOS ATTACKS IN WIRELESS SENSOR NETWORKS USING ANT SYSTEM

IMPROVING QOS UNDER DDOS ATTACKS IN WIRELESS SENSOR NETWORKS USING ANT SYSTEM

... Sensor networks using distributed wireless technology is widely used in many applications like disaster relief and tsunami warning ...QoS.In Wireless Sensor Networks a ... See full document

9

AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

... scheme to unauthenticated packets detection and filtering has been ...redundancy in routing algorithms as multipath routing to prevent access of event information by the malicious ...offered ... See full document

6

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

... protocol in wireless sensor ...is to recursively divide the sensor network into four partitions symmetrical about a centroid ...heads in the middle of each partition are defined ... See full document

12

Target Localization and Tracking in Wireless Sensor Networks

Target Localization and Tracking in Wireless Sensor Networks

... life). In such settings, only some targets can directly communicate with anchors; therefore, cooperation between any two sensors within the communication range is required in order to acquire ... See full document

168

Spatial query processing for wireless sensor networks

Spatial query processing for wireless sensor networks

... [r] ... See full document

142

Data storage system for wireless sensor networks

Data storage system for wireless sensor networks

... notifications in it and use a stored notification, as long as it is fresh, to serve other clients requesting it, without contacting the origin ...incorporated in Observe, allows registrations and ... See full document

73

Ubiquitous model for wireless sensor networks monitoring

Ubiquitous model for wireless sensor networks monitoring

... Abstract— Wireless sensor networks (WSNs) belong to emerging technologies where network devices can interact with the surrounding environment by sensing physical ...devices to Internet ... See full document

71

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

... access to the graph of relationships as ...introduced to avoid from such ...mechanism to gain a balance between security and performance because it is easy to enhance the performance and ... See full document

5

Identity-based Trusted Authentication in Wireless Sensor Networks

Identity-based Trusted Authentication in Wireless Sensor Networks

... contributing to the selection of the hash ...enough to fit into the secured location and the second is that the algorithm must be powerful enough to resist from attacks with no collision [11] ... See full document

10

Performance assessment of real-time data management on wireless sensor networks

Performance assessment of real-time data management on wireless sensor networks

... on wireless sensor networks. In fact nowadays, systems based on sensor networks are getting increasingly used in many areas of the knowledge, giving rise to several ... See full document

165

A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS BASED ON POLYCHROMATIC SETS THEORY

A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS BASED ON POLYCHROMATIC SETS THEORY

... the heterogeneous wireless sensor networks in ...deployed in a 1000m × 1000m area ...defined in section 3. In a simplified simulation, we assume that all the nodes ... See full document

13

An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

... of wireless sensor network is how to improve its life ...of wireless sensor network is an NP-Hard ...Optimization to overcome this clustering problem by finding the number of ... See full document

5

Analysis of k-Coverage in Wireless Sensor Networks

Analysis of k-Coverage in Wireless Sensor Networks

... related to the coverage ...scheduled to conserve ...them to conserve energy and thus extend the lifetime of the ...affected).Author in [6] proposes a heuristic to select mutually ... See full document

6

Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility

Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility

... the sensor and uses it to predict future mobil- ...predicted to exceed the error ...often. In the case where the prediction is perfect, node does not carried out ...model to go wrong. ... See full document

7

3-D Target Localization in Wireless Sensor Network Using RSS and AoA Measurements

3-D Target Localization in Wireless Sensor Network Using RSS and AoA Measurements

... approaches in [22]–[24] are based on the fusion of RSS and ToA ...investigated in [25]. Yu in [25] proposed two estimators for solving the noncooperative target localization problem in a 3-D ... See full document

5

Show all 10000 documents...