Denial of service attacks in wireless networks: The case of jammers

K Pelechrinis, M Iliofotou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The shared nature of the medium in wireless networks makes it easy for an adversary to
launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Detecting and correcting malicious data in VANETs

P Golle, D Greene, J Staddon - Proceedings of the 1st ACM international …, 2004 - dl.acm.org
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks
(VANETs) must rely heavily on node-to-node communication, thus allowing for malicious …

Intrusion detection in wireless ad hoc networks

A Mishra, K Nadkarni, A Patcha - IEEE wireless …, 2004 - ieeexplore.ieee.org
Intrusion detection has, over the last few years, assumed paramount importance within the
broad realm of network security, more so in the case of wireless ad hoc networks. These are …

[图书][B] The handbook of ad hoc wireless networks

M Ilyas, BC Seet, X Hannan, YC Tseng, A Mishra… - 2017 - taylorfrancis.com
A relative newcomer to the field of wireless communications, ad hoc networking is growing
quickly, both in its importance and its applications. With rapid advances in hardware …

Method and system for detecting and preventing access intrusion in a network

MM Rathi, VK Jain, ST Merchant, VC Lin - US Patent 8,707,432, 2014 - Google Patents
US8707432B1 - Method and system for detecting and preventing access intrusion in a network
- Google Patents US8707432B1 - Method and system for detecting and preventing access …

Dempster-Shafer theory for intrusion detection in ad hoc networks

TM Chen, V Venkataramanan - IEEE Internet computing, 2005 - ieeexplore.ieee.org
Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion
detection among their nodes. But even though a distributed intrusion-detection system can …

Anomaly intrusion detection in wireless sensor networks

V Bhuse, A Gupta - Journal of High Speed Networks, 2006 - content.iospress.com
We propose lightweight methods to detect anomaly intrusions in wireless sensor networks
(WSNs). The main idea is to reuse the already available system information that is …

Unified, configurable, adaptive, network architecture

ST Merchant, MM Rathi, VC Lin, VK Jain, JR Li… - US Patent …, 2007 - Google Patents
(57) ABSTRACT A network Switch having a unified, adaptive management paradigm for
wireless network devices is disclosed. The Switch includes configurable ports for connecting …

Security in wireless ad hoc networks

A Mishra, KM Nadkarni - The handbook of ad hoc wireless networks, 2003 - dl.acm.org
The realm of wireless ad hoc networks is a relatively new one, even with advancement in
wireless networks in general. Essentially, these are networks that do not have an underlying …