Wireless Network Security 2006
-
Citation: EURASIP Journal on Wireless Communications and Networking 2007 2006:048374
-
On the Design of Error-Correcting Ciphers
Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless envi...
Citation: EURASIP Journal on Wireless Communications and Networking 2007 2006:042871 -
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i
This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outline...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:047453 -
MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks
Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium a...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:093830 -
Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment
Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:073685 -
Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs
Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation....
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:078259 -
Key Management for Secure Multicast over IPv6 Wireless Networks
Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over ...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:061769 -
Multiple-Channel Security Architecture and its Implementation over SSL
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enable...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:085495 -
ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs
Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with tradition...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:096157 -
On Optimizing Compatible Security Policies in Wireless Networks
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:023728 -
SeGrid: A Secure Grid Framework for Sensor Networks
In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since ...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:090652 -
A Robust on-Demand Path-Key Establishment Framework via Random Key Predistribution for Wireless Sensor Networks
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impr...
Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:091304