Sciweavers

215 search results - page 6 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
TON
2008
108views more  TON 2008»
13 years 8 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
OTM
2009
Springer
14 years 3 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
JPDC
2006
253views more  JPDC 2006»
13 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 8 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...