Sciweavers

25 search results - page 1 / 5
» Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Sort
View
ACISP
2010
Springer
13 years 7 months ago
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
JCM
2008
69views more  JCM 2008»
13 years 6 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
INFOCOM
2003
IEEE
13 years 11 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
AINA
2011
IEEE
12 years 10 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
SASN
2003
ACM
13 years 11 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee