Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product reliability. An ideal application for wire...
Robust operation of wireless sensor networks deployed in harsh environment is important in many application. In this paper, we develop a robust technique for distributed detection...