On the vital areas of intrusion detection systems in wireless sensor networks

A Abduvaliyev, ASK Pathan, J Zhou… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs,
and presents a comprehensive classification of various IDS approaches according to their …

Survey on broadcast algorithms for mobile ad hoc networks

P Ruiz, P Bouvry - ACM computing surveys (CSUR), 2015 - dl.acm.org
Networking at any time and any place paves the way for a large number of possible
applications in ad hoc networks, from disaster relief in remote areas to network extension …

Hidden conditional random fields for gesture recognition

SB Wang, A Quattoni, LP Morency… - 2006 IEEE Computer …, 2006 - ieeexplore.ieee.org
We introduce a discriminative hidden-state approach for the recognition of human gestures.
Gesture sequences often have a complex underlying structure, and models that can …

Intrusion detection in homogeneous and heterogeneous wireless sensor networks

Y Wang, X Wang, B Xie, D Wang… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many
applications such as detecting an intruder in a battlefield. The intrusion detection is defined …

Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge

TH Hai, EN Huh - 2008 Seventh IEEE International Symposium …, 2008 - ieeexplore.ieee.org
Wireless sensor networks have many potential applications for both civil and military tasks.
However, WSNs are susceptible to many types of attacks because they are deployed in …

A lightweight intrusion detection framework for wireless sensor networks

TH Hai, EN Huh, M Jo - Wireless Communications and mobile …, 2010 - Wiley Online Library
Abstract In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful
applications for both civil and military tasks. However, sensor networks are susceptible to …

Secure and efficient broadcast authentication in wireless sensor networks

T Kwon, J Hong - IEEE Transactions on computers, 2009 - ieeexplore.ieee.org
Authenticated broadcast, enabling a base station to send commands and requests to low-
powered sensor nodes in an authentic manner, is one of the core challenges for securing …

CStorage: Decentralized compressive data storage in wireless sensor networks

A Talari, N Rahnavard - Ad Hoc Networks, 2016 - Elsevier
In this paper, we employ compressive sensing (CS) to design a distributed compressive data
storage (CStorage) algorithm for wireless sensor networks (WSNs). First, we assume that no …

A probabilistic and opportunistic flooding algorithm in wireless sensor networks

D Chang, K Cho, N Choi, Y Choi - Computer Communications, 2012 - Elsevier
In wireless sensor networks, many communication protocols and applications rely on
flooding for various networking purposes. Prior efforts focus on how to design efficient …

Geometric broadcast protocol for heterogeneous sensor networks

A Durresi, V Paruchuri, R Jain - Journal of Interconnection Networks, 2005 - World Scientific
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel
broadcasting protocol for heterogeneous wireless sensor and actor networks. While …