Sciweavers

215 search results - page 38 / 43
» Time synchronization attacks in sensor networks
Sort
View
SASN
2003
ACM
15 years 5 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ESAS
2004
Springer
15 years 3 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
ACSAC
2007
IEEE
15 years 6 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
SIROCCO
2010
15 years 1 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
ICASSP
2010
IEEE
14 years 6 months ago
Performance of shockwave-based shooter localization under model misspecification
This paper considers the estimation of shooter locations using a sensor network where each sensor measures the time difference between receptions of a firearm's muzzle blast ...
Joshua N. Ash, Gene T. Whipps, Richard J. Kozick