Skip to content

Advertisement

Wireless Network Security 2009

  1. Content type: Research Article

    Trust aware routing in Wireless Sensor Network (WSN) is an important direction in designing routing protocols for WSN that are susceptible to malicious attacks. The common approach to provide trust aware routi...

    Authors: Ismat Maarouf, Uthman Baroudi and A. R. Naseer

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:718318

    Published on:

  2. Content type: Editorial

    Authors: Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin and Ding-Zhu Du

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:532434

    Published on:

  3. Content type: Research Article

    Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on...

    Authors: Zhu Han and Yan Lindsay Sun

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:740912

    Published on:

  4. Content type: Research Article

    The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile ...

    Authors: Jeong-Jae Won, Murahari Vadapalli, Choong-Ho Cho and VictorCM Leung

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:716480

    Published on:

  5. Content type: Research Article

    The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the nod...

    Authors: Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:945943

    Published on:

  6. Content type: Review Article

    Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of b...

    Authors: Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng and Jingyuan Zhang

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:692654

    Published on:

  7. Content type: Research Article

    Routing amid malicious attackers in multihop wireless networks with unreliable links is a challenging task. In this paper, we address the fundamental problem of how to choose secure and reliable paths in such ...

    Authors: Lin Chen and Jean Leneutre

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:946493

    Published on:

  8. Content type: Research Article

    Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of us...

    Authors: Sehwa Song, Hyoung-Kee Choi and Jung-Yoon Kim

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:957690

    Published on:

  9. Content type: Research Article

    In a hostile environment, it is important for a transmitter to make its wireless transmission invisible to adversaries because an adversary can detect the transmitter if the received power at its antennas is s...

    Authors: Xiaofeng Lu, Don Towsley, Pietro Lio', Fletcher Wicker and Zhang Xiong

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:256714

    Published on:

  10. Content type: Research Article

    Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover...

    Authors: Ali Al Shidhani and Victor C. M. Leung

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:806563

    Published on:

  11. Content type: Research Article

    Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailabili...

    Authors: Yingchang Xiang, Fang Liu, Xiuzhen Cheng, Dechang Chen and David H. C. Du

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:427492

    Published on:

  12. Content type: Research Article

    Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used ...

    Authors: An-Ni Shen, Song Guo and Victor Leung

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:240610

    Published on:

  13. Content type: Research Article

    A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital ...

    Authors: Christine Laurendeau and Michel Barbeau

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:128679

    Published on: