Sciweavers

42 search results - page 8 / 9
» An End-to-end Detection of Wormhole Attack in Wireless Ad-ho...
Sort
View
RAID
2010
Springer
13 years 4 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
CSREASAM
2006
13 years 7 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
WICON
2010
13 years 4 months ago
Toward Clock Skew based Wireless Sensor Node Services
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the tempera...
Md. Borhan Uddin, Claude Castelluccia
WISEC
2010
ACM
14 years 1 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
ICICS
2004
Springer
13 years 11 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot