Sciweavers

1278 search results - page 90 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
156
Voted
MASS
2010
156views Communications» more  MASS 2010»
15 years 1 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 9 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
SASN
2003
ACM
15 years 9 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
CODES
2005
IEEE
15 years 9 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
MONET
2002
142views more  MONET 2002»
15 years 3 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston