Sciweavers

53 search results - page 2 / 11
» Breaking network security based on synchronized chaos
Sort
View
GLOBECOM
2008
IEEE
13 years 11 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun
ACSAC
2005
IEEE
13 years 10 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
CCS
2006
ACM
13 years 8 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
MSWIM
2005
ACM
13 years 10 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
SASN
2003
ACM
13 years 10 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...