Sciweavers

422 search results - page 8 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
PEWASUN
2004
ACM
14 years 1 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICDCS
2008
IEEE
14 years 2 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
TWC
2008
129views more  TWC 2008»
13 years 7 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
PERCOM
2005
ACM
14 years 7 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong