Sciweavers

422 search results - page 8 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
PEWASUN
2004
ACM
15 years 5 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICDCS
2008
IEEE
15 years 6 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
TWC
2008
129views more  TWC 2008»
14 years 11 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu
PERCOM
2005
ACM
15 years 11 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong