Sciweavers

74 search results - page 11 / 15
» Detecting Wormhole Attacks in Wireless Networks Using Connec...
Sort
View
RAID
1999
Springer
14 years 25 days ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
MOBICOM
2004
ACM
14 years 2 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...
ICUMT
2009
13 years 6 months ago
Free-CLASH - improved localization-free clustering in large wireless sensor networks
This paper investigates topology management of large wireless sensor networks. Due to their random deployment, nodes have to organize themselves as energy efficient as possible to ...
Jakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timme...
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
MOBIHOC
2005
ACM
14 years 8 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha