Sciweavers

74 search results - page 7 / 15
» Detecting Wormhole Attacks in Wireless Networks Using Connec...
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
RAID
2005
Springer
14 years 2 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
WISEC
2010
ACM
14 years 3 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
AIMS
2008
Springer
14 years 2 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
SAINT
2008
IEEE
14 years 3 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki