Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
biblio
Cross-Layer Dynamic Admission Control for Cloud-Based Multimedia Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:26am
IEEE standards
Zigbee
wireless sensor networks
telecommunication congestion control
standard IEEE 802.15.4 technology
standard IEEE 802.15.3 technology
sensor networks
optimal node arrival rates
network resources
network access technology
multimedia delivery
multimedia communications
Multimedia communication
Admission control
extensive simulation study
dynamic cloud-based multimedia sensor networks
cross-layer dynamic admission control
cross-layer design
cross-layer admission control
control engineering computing
cloud-based sensor networks
cloud-based communications system
Cloud Computing
channel effects
channel characterization scheme
Channel allocation
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 10:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead
biblio
Privacy-preserving channel access using blindfolded packet transmissions
Submitted by BrandonB on Mon, 05/04/2015 - 2:12pm
Mica2 hardware
wireless sensor networks
wireless MAC-layer approach
wireless channels
Tinyos-2x test-bed implementation
time division multiple access
TDMA
RSSI
protocol
privacy-preserving channel access anonymity
privacy
periodic TDMA-Iike time-slot
Noise
add-on hardware module
MAC protocols
Interference
Heating
Google
Equations
data privacy
Cryptography
convergence
channel sensing strategy
blindfolded packet transmission
anonymity
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 2:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:57pm
Media Access Protocol
WSN topology
wireless sensor networks
Wireless Sensor Network
traffic analysis technique
telecommunication traffic
telecommunication security
standards
sensors
network traffic flow
acknowledged communication
Measurement
location privacy
enhanced evidence theory metric
Correlation
base station anonymity
anonymity
acknowledgement based wireless sensor networks
acknowledgement aware evidence theory
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »