Skip to content

Advertisement

Wireless Network Security 2006

  1. Content type: Research Article

    Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless envi...

    Authors: Chetan Nanjunda Mathur, Karthik Narayan and K. P. Subbalakshmi

    Citation: EURASIP Journal on Wireless Communications and Networking 2007 2006:042871

    Published on:

  2. Content type: Research Article

    This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outline...

    Authors: Floriano De Rango, Dionigi Cristian Lentini and Salvatore Marano

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:047453

    Published on:

  3. Content type: Research Article

    Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium a...

    Authors: Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang and Sakshi Sethi

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:093830

    Published on:

  4. Content type: Research Article

    Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking...

    Authors: G. Ginesu, D. D. Giusto and T. Onali

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:073685

    Published on:

  5. Content type: Research Article

    Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation....

    Authors: Giannis F Marias, Konstantinos Papapanagiotou, Vassileios Tsetsos, Odysseas Sekkas and Panagiotis Georgiadis

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:078259

    Published on:

  6. Content type: Research Article

    Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over ...

    Authors: Win Aye and Mohammad Umar Siddiqi

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:061769

    Published on:

  7. Content type: Research Article

    This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enable...

    Authors: Yong Song, Konstantin Beznosov and Victor C. M. Leung

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:085495

    Published on:

  8. Content type: Research Article

    Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with tradition...

    Authors: Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:096157

    Published on:

  9. Content type: Research Article

    This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible...

    Authors: Scott C-H Huang, Kia Makki and Niki Pissinou

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:023728

    Published on:

  10. Content type: Research Article

    In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since ...

    Authors: Xiuzhen Cheng, Fang Liu and Fengguang An

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:090652

    Published on:

  11. Content type: Research Article

    Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impr...

    Authors: Guanfeng Li, Hui Ling, Taieb Znati and Weili Wu

    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:091304

    Published on: