On the vital areas of intrusion detection systems in wireless sensor networks
A Abduvaliyev, ASK Pathan, J Zhou… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs,
and presents a comprehensive classification of various IDS approaches according to their …
and presents a comprehensive classification of various IDS approaches according to their …
Survey on broadcast algorithms for mobile ad hoc networks
Networking at any time and any place paves the way for a large number of possible
applications in ad hoc networks, from disaster relief in remote areas to network extension …
applications in ad hoc networks, from disaster relief in remote areas to network extension …
Hidden conditional random fields for gesture recognition
SB Wang, A Quattoni, LP Morency… - 2006 IEEE Computer …, 2006 - ieeexplore.ieee.org
We introduce a discriminative hidden-state approach for the recognition of human gestures.
Gesture sequences often have a complex underlying structure, and models that can …
Gesture sequences often have a complex underlying structure, and models that can …
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many
applications such as detecting an intruder in a battlefield. The intrusion detection is defined …
applications such as detecting an intruder in a battlefield. The intrusion detection is defined …
Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge
Wireless sensor networks have many potential applications for both civil and military tasks.
However, WSNs are susceptible to many types of attacks because they are deployed in …
However, WSNs are susceptible to many types of attacks because they are deployed in …
A lightweight intrusion detection framework for wireless sensor networks
Abstract In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful
applications for both civil and military tasks. However, sensor networks are susceptible to …
applications for both civil and military tasks. However, sensor networks are susceptible to …
Secure and efficient broadcast authentication in wireless sensor networks
Authenticated broadcast, enabling a base station to send commands and requests to low-
powered sensor nodes in an authentic manner, is one of the core challenges for securing …
powered sensor nodes in an authentic manner, is one of the core challenges for securing …
CStorage: Decentralized compressive data storage in wireless sensor networks
A Talari, N Rahnavard - Ad Hoc Networks, 2016 - Elsevier
In this paper, we employ compressive sensing (CS) to design a distributed compressive data
storage (CStorage) algorithm for wireless sensor networks (WSNs). First, we assume that no …
storage (CStorage) algorithm for wireless sensor networks (WSNs). First, we assume that no …
A probabilistic and opportunistic flooding algorithm in wireless sensor networks
In wireless sensor networks, many communication protocols and applications rely on
flooding for various networking purposes. Prior efforts focus on how to design efficient …
flooding for various networking purposes. Prior efforts focus on how to design efficient …
Geometric broadcast protocol for heterogeneous sensor networks
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel
broadcasting protocol for heterogeneous wireless sensor and actor networks. While …
broadcasting protocol for heterogeneous wireless sensor and actor networks. While …