— In this paper, we study search algorithms for using a set of autonomous and cooperative mobile sensor nodes (MSN) with limited sensing and communication ranges to search a larg...
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
— The performances in cooperative communications depend on careful resource allocation such as relay selection and power control, but traditional centralized resource allocation ...
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...