The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion detection system (IDS) is one of the basic components of network security. IDS can use signatures or abnormal behaviors to detect attacks. When IDS uses signatures, in order to detect more attacks, we have to implement more attack signatures on IDS. However, in resource-constrained wireless sensor networks, it is not efficient to implement all of attack signatures. And it is hard to maintain...
In indoor sensor networks, due to resource limitation of the sensor nodes, some of the traditional positioning algorithms, such as two-phase positioning (TPP) algorithm, are too complicated to be implemented and they can't satisfy the real-time localization of the mobile node. We analyze the localization error and draw the conclusion that the localization error is the least when three reference nodes...
Securing wireless sensor networks (WSNs) in a fully self-organized way is effective and light-weight, but traditional trust mechanisms can't efficiently provide a security for sensor nodes with resources limited in many applications, especially in a complex and varying military environment, sensor networks can be easily attacked by malicious and hostile nodes using the natural cooperation characteristic...
In wireless sensor networks (WSNs), nodes assist each other by passing data and control packets from one node to another. In a complex WSN, malicious nodes are well disguised so that they can purposely attack the whole network using the natural cooperations of sensors. In additional, the error-prone of sensors always cause the system instability of WSNs. To overcome this, we study trust mechanism...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.