Sciweavers

467 search results - page 5 / 94
» Wormhole attacks in wireless networks
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 1 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
DCOSS
2006
Springer
13 years 11 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan
WICON
2010
13 years 5 months ago
Toward Clock Skew based Wireless Sensor Node Services
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the tempera...
Md. Borhan Uddin, Claude Castelluccia
JSAC
2006
183views more  JSAC 2006»
13 years 7 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran