Sciweavers

467 search results - page 28 / 94
» Wormhole attacks in wireless networks
Sort
View
ICCSA
2005
Springer
14 years 3 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 4 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 3 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
ICCSA
2010
Springer
14 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
CORR
2007
Springer
123views Education» more  CORR 2007»
13 years 9 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...