Sciweavers

467 search results - page 4 / 94
» Wormhole attacks in wireless networks
Sort
View
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 7 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
WISEC
2010
ACM
14 years 2 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 2 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
IJSN
2008
92views more  IJSN 2008»
13 years 7 months ago
Visualisation of wormholes in underwater sensor networks: a distributed approach
: We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dim...
Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mar...
DSN
2004
IEEE
13 years 11 months ago
Dependable Adaptive Real-Time Applications in Wormhole-based Systems
This paper describes and discusses the work carried on in the context of the CORTEX project, for the development of adaptive real-time applications in wormhole based systems. The ...
Pedro Martins, Paulo Jorge Paiva de Sousa, Antonio...