Sciweavers

291 search results - page 26 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
Network Coding via Opportunistic Forwarding in Wireless Mesh Networks
— Network coding has been used to increase transportation capabilities in wireless mesh networks. In mesh networks, the coding opportunities depend on the co-location of multiple...
Jian Zhang, Yuanzhu Peter Chen, Ivan Marsic
129
Voted
IWSOS
2007
Springer
15 years 10 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
IPPS
2006
IEEE
15 years 10 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
INFOCOM
2005
IEEE
15 years 9 months ago
Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks
— In this paper, we present a novel packet delivery mechanism called Multi-path and Multi-Speed Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor netw...
Emad Felemban, Chang-Gun Lee, Eylem Ekici, Ryan Bo...
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 3 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau