Sciweavers

736 search results - page 89 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
PEWASUN
2008
ACM
14 years 11 months ago
Source traffic modeling in wireless sensor networks for target tracking
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Qinghua Wang, Tingting Zhang
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
IJSNET
2008
126views more  IJSNET 2008»
14 years 9 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
ESAS
2007
Springer
15 years 3 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel
DSN
2006
IEEE
15 years 3 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham