Sciweavers

422 search results - page 65 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 7 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
WISEC
2010
ACM
14 years 2 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
INFOCOM
2010
IEEE
13 years 6 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
PERCOM
2005
ACM
14 years 1 months ago
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In th...
Atul Verma, Hemjit Sawant, Jindong Tan