Sciweavers

467 search results - page 26 / 94
» Wormhole attacks in wireless networks
Sort
View
ADHOC
2007
164views more  ADHOC 2007»
13 years 7 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
ESAS
2004
Springer
14 years 1 months ago
A Security Architecture for Mobile Wireless Sensor Networks
Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
Stefan Schmidt, Holger Krahn, Stefan Fischer, Diet...
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
12 years 3 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
SASN
2006
ACM
14 years 1 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
SAINT
2003
IEEE
14 years 28 days ago
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detectio...
Paul Brutch, Calvin Ko