Attack-resistant wireless localization using an inclusive disjunction model

SH Fang, CC Chuang, C Wang - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless positioning is vulnerable to malicious attacks due to the nature of its open medium.
This study proposes an attack-resistant fingerprinting localization algorithm based on a …

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

D Hao, X Liao, A Adhikari, K Sakurai… - Computer Communications, 2012 - Elsevier
In multihop wireless networks (MWNs), the selective forwarding attack is a special case of
denial of service attack. In this attack, the malicious wireless nodes only forward a subset of …

Measures and countermeasures for null frequency jamming of on-demand routing protocols in wireless ad hoc networks

M Balakrishnan, H Huang… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Distributed network protocols operate similar to periodic state machines, utilizing internal
states and timers for network coordination, which creates opportunities for carefully …

[PDF][PDF] Analysis of Byzantine Attacks in Adhoc Networks and Their Mitigation

S Sofi, E Malik, R Baba, H Baba… - … Conference on Computing …, 2012 - researchgate.net
Ad hoc networking somewhat differs from more traditional approaches, the security aspects
that are valid in the networks of the past are not fully applicable in the networks. Ad hoc …

Mixed-Strategy game based trust management for clustered wireless sensor networks

D Hao, A Adhikari, K Sakurai - … 2011, Beijing, China, November 27-29 …, 2012 - Springer
Wireless sensor networks are vulnerable to a large number of security threats and malicious
attacks. The traditional security approaches from encryption and authentication are …

Detection of selective forwarding attack in wireless ad hoc networks using binary search

S Mukherjee, M Chattopadhyay… - 2012 Third …, 2012 - ieeexplore.ieee.org
Selective forwarding attack is one of the most harmful attacks in wireless networks. This
paper proposes an algorithm to defend against selective forwarding attacks based on binary …

A survey on DoS attacks and detection schemes in wireless mesh Networks

SE Anto, S Seetha, RK Kuriakose - Procedia engineering, 2012 - Elsevier
A Wireless mesh network is a dynamically self-organized, self-configured, multi-hop wireless
network. The WMNs provides wireless services for a variety of applications in personal …

[引用][C] Review of main security threats in Smart Home networks

I Seminar, R Eržen