Sciweavers

291 search results - page 19 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
15 years 2 months ago
A general Gaussian-mixture approach for range-only mapping using multiple hypotheses
— Radio signal-based localization and mapping is becoming more interesting as applications involving the collaboration between robots and static wireless devices are more common....
Fernando Caballero, Luis Merino, Aníbal Oll...
CNSR
2005
IEEE
116views Communications» more  CNSR 2005»
15 years 9 months ago
Connectivity with Static Transmission Range in Vehicular Ad Hoc Networks
Connectivity in mobile wireless ad-hoc networks is maintained by setting the transmission range so that a node can establish a link to any other node in the network either directl...
Maen M. Artimy, William J. Phillips, William Rober...
111
Voted
ICNP
2006
IEEE
15 years 10 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
ACSAC
2004
IEEE
15 years 7 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
151
Voted
SECON
2008
IEEE
15 years 10 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru