Sciweavers

467 search results - page 13 / 94
» Wormhole attacks in wireless networks
Sort
View
WICON
2008
13 years 9 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
MONET
2002
142views more  MONET 2002»
13 years 7 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
ESORICS
2011
Springer
12 years 7 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
GLOBECOM
2010
IEEE
13 years 5 months ago
Attack-Resistant Collaboration in Wireless Video Streaming Social Networks
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with eac...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
INFOCOM
2007
IEEE
14 years 1 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...