Sciweavers

1014 search results - page 3 / 203
» Distributed Algorithms for Attack Localization in All-Optica...
Sort
View
INFOCOM
2007
IEEE
13 years 12 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
DCOSS
2006
Springer
13 years 9 months ago
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study
In this paper, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more lan...
Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li...
IFIP
2007
Springer
13 years 11 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
WS
2004
ACM
13 years 11 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
13 years 11 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...