Sciweavers

636 search results - page 98 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 2 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 8 months ago
Highway Mobility and Vehicular Ad-Hoc Networks in NS-3
The study of vehicular ad-hoc networks (VANETs) requires efficient and accurate simulation tools. As the mobility of vehicles and driver behavior can be affected by network messag...
Hadi Arbabi, Michele C. Weigle
ACSW
2006
13 years 10 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
INFOCOM
2007
IEEE
14 years 2 months ago
Resilient Network Coding in the Presence of Byzantine Adversaries
Abstract— Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a mali...
Sidharth Jaggi, Michael Langberg, Sachin Katti, Tr...
JSAC
2008
167views more  JSAC 2008»
13 years 8 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell