The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In timing analysis attackers study the transmission pattern of different nodes in a network with the goal of extracting information about users, applications, or the structure of the network, even when the traffic is encrypted. Defeating timing analysis attacks requires expensive traffic mixing measures that equalize the transmission pattern at all nodes; such measures are especially expensive for...
Wireless sensor networks (WSNs) are highly susceptible to jamming attacks due to their resource limitations. In WSN architecture, the Base Station (BS) is a single point of failure, because it collects sensor readings and performs command and control tasks. So BSs are main targets of the jamming attack. For mitigating the effects of BS jamming attacks, we propose a hybrid model of defense, which combines...
In this paper, we discuss wireless reduction of quality (RoQ) attacks against the transmission control protocol (TCP). RoQ attacks can dramatically degrade the TCP performance with a less number of wireless jamming attacking packets, which makes them rather difficult to detect. We propose a RoQ attack model which exposes the possibility to launch a RoQ attack and illustrates attack conditions. A CTS...
In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless sensor networks. We define a new throughput characteristic function, on the basis of which nodes are enforced to cooperate and form coalitions. This function implies the maximal throughput and the most reliable traffic that...
Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.