Sciweavers

80 search results - page 7 / 16
» Real-Time Detection of Clone Attacks in Wireless Sensor Netw...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 1 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 2 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
SECON
2008
IEEE
14 years 1 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
PERCOM
2006
ACM
14 years 7 months ago
Resilient Aggregation with Attack Detection in Sensor Networks
In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected d...
Levente Buttyán, Péter Schaffer, Ist...