Sciweavers

105 search results - page 9 / 21
» MUTON: Detecting Malicious Nodes in Disruption-Tolerant Netw...
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun
WOWMOM
2005
ACM
87views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Reputation Management for Collaborative Content Distribution
We propose a reputation-based trust management system, ROCQ, to reduce inauthentic and corrupted file transfers in end-user collaborative content-distribution systems. Such syste...
Anurag Garg, Roberto G. Cascella
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 2 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 2 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 2 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...