Sciweavers

610 search results - page 28 / 122
» Application-level Simulation for Network Security
Sort
View
PADS
2009
ACM
15 years 4 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
83
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
70
Voted
CROSSROADS
2004
108views more  CROSSROADS 2004»
14 years 9 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
ICASSP
2010
IEEE
14 years 10 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu