Sciweavers

17 search results - page 2 / 4
» Comparison of Failures and Attacks on Random and Scale-Free ...
Sort
View
PERCOM
2006
ACM
14 years 4 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
13 years 10 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
13 years 11 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
13 years 9 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ICC
2008
IEEE
106views Communications» more  ICC 2008»
13 years 11 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...