Sciweavers

736 search results - page 1 / 148
» Detection of Masquerade Attacks on Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
DSN
2003
IEEE
14 years 20 days ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
DSN
2002
IEEE
14 years 10 days ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...