Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless Sensor Network
biblio
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:57pm
Media Access Protocol
WSN topology
wireless sensor networks
Wireless Sensor Network
traffic analysis technique
telecommunication traffic
telecommunication security
standards
sensors
network traffic flow
acknowledged communication
Measurement
location privacy
enhanced evidence theory metric
Correlation
base station anonymity
anonymity
acknowledgement based wireless sensor networks
acknowledgement aware evidence theory
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
biblio
Inspecting the Ways of Source Anonymity in Wireless Sensor Network
Submitted by BrandonB on Mon, 05/04/2015 - 1:45pm
adversarial assumptions
anonymity
coding theory
Communication Systems
event source anonymity
LSB steganography technique
network traffic
persistent dummy traffic
source location privacy
statistical test
Steganography
telecommunication traffic
Wireless Sensor Network
wireless sensor networks
biblio
Intelligent wall mounted wireless fencing system using wireless sensor actuator network
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
wireless camera
multihop routing
multilevel detection mechanism
radio transceivers
safety systems
Software
telecommunication computing
telecommunication network routing
wall mounted wireless intrusion detection system
Monitoring
Wireless communication
wireless mesh network
wireless mesh networks
wireless sensor actuator network
Wireless Sensor Network
wireless sensor networks
Zigbee
intelligent wall mounted wireless fencing system
Cameras
cellular radio
central control station
Communication system security
electronic messaging
GSM modem
IEEE 802.15.4
IEEE 802.15.4 protocol
active RFID
Intrusion Detection
intrusion software
IR based intrusion detection system
IR based perimeter protection
IR transceiver module
microwave based intrusion detection
microwave sensor technology
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks
biblio
Profile Based Scheme Against DDoS Attack in WSN
Submitted by BrandonB on Thu, 04/30/2015 - 1:09pm
challenges
DDoS Attacks
Defensive mechanisms
PPS
Security Goal
Wireless Sensor Network
« first
‹ previous
1
2
3
4
5
6
7
8
9