Sciweavers

291 search results - page 10 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
71
Voted
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
INFOCOM
2007
IEEE
15 years 3 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
INFOCOM
2005
IEEE
15 years 3 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
INFOCOM
2012
IEEE
12 years 12 months ago
Physical layer security from inter-session interference in large wireless networks
—Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the f...
Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pis...
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
13 years 5 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...