Sciweavers

291 search results - page 9 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
103
Voted
NAS
2010
IEEE
14 years 8 months ago
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, et...
Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zh...
MASS
2010
181views Communications» more  MASS 2010»
14 years 7 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
79
Voted
WISEC
2010
ACM
15 years 2 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 9 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
PODC
2010
ACM
15 years 1 months ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...