Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
—Wireless sensor networks are increasingly being used for continuous monitoring of patients with chronic health conditions such as diabetes and heart problems. As biomedical sens...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...