Skip to main content

Wireless Network Security 2009

  1. Trust aware routing in Wireless Sensor Network (WSN) is an important direction in designing routing protocols for WSN that are susceptible to malicious attacks. The common approach to provide trust aware routi...

    Authors: Ismat Maarouf, Uthman Baroudi and A. R. Naseer
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:718318
  2. Authors: Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin and Ding-Zhu Du
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:532434
  3. Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on...

    Authors: Zhu Han and Yan Lindsay Sun
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:740912
  4. The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile ...

    Authors: Jeong-Jae Won, Murahari Vadapalli, Choong-Ho Cho and VictorCM Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:716480
  5. The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the nod...

    Authors: Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:945943
  6. Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of b...

    Authors: Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng and Jingyuan Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:692654
  7. Routing amid malicious attackers in multihop wireless networks with unreliable links is a challenging task. In this paper, we address the fundamental problem of how to choose secure and reliable paths in such ...

    Authors: Lin Chen and Jean Leneutre
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:946493
  8. Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of us...

    Authors: Sehwa Song, Hyoung-Kee Choi and Jung-Yoon Kim
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:957690
  9. Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover...

    Authors: Ali Al Shidhani and Victor C. M. Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:806563
  10. In a hostile environment, it is important for a transmitter to make its wireless transmission invisible to adversaries because an adversary can detect the transmitter if the received power at its antennas is s...

    Authors: Xiaofeng Lu, Don Towsley, Pietro Lio', Fletcher Wicker and Zhang Xiong
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:256714
  11. Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailabili...

    Authors: Yingchang Xiang, Fang Liu, Xiuzhen Cheng, Dechang Chen and David H. C. Du
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:427492
  12. Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used ...

    Authors: An-Ni Shen, Song Guo and Victor Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:240610
  13. A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital ...

    Authors: Christine Laurendeau and Michel Barbeau
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:128679