Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...