Sciweavers

88 search results - page 11 / 18
» Impact of denial of service attacks on ad hoc networks
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
AINA
2007
IEEE
14 years 2 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
TELSYS
2010
154views more  TELSYS 2010»
13 years 2 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
WIOPT
2010
IEEE
13 years 6 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
TSMC
2010
13 years 2 months ago
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, mali...
Feng Li, Yinying Yang, Jie Wu