Sciweavers

736 search results - page 35 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
NDSS
2003
IEEE
15 years 2 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
CEC
2007
IEEE
15 years 4 months ago
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
— A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices are expected to operate autonomously, be batte...
Martin Drozda, Sven Schaust, Helena Szczerbicka
IEEEIAS
2008
IEEE
15 years 4 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
IJDSN
2006
114views more  IJDSN 2006»
14 years 9 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
RAID
2000
Springer
15 years 1 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner