Skip to main content

Wireless Network Security 2006

  1. Research Article

    On the Design of Error-Correcting Ciphers

    Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless envi...

    Chetan Nanjunda Mathur, Karthik Narayan and K. P. Subbalakshmi

    EURASIP Journal on Wireless Communications and Networking 2007 2006:042871

    Published on: 28 January 2007

  2. Editorial

    Wireless Network Security

    Yang Xiao, Yi-Bing Lin and Ding-Zhu Du

    EURASIP Journal on Wireless Communications and Networking 2007 2006:048374

    Published on: 28 January 2007

  3. Research Article

    Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

    This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outline...

    Floriano De Rango, Dionigi Cristian Lentini and Salvatore Marano

    EURASIP Journal on Wireless Communications and Networking 2006 2006:047453

    Published on: 16 October 2006

  4. Research Article

    MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks

    Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium a...

    Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang and Sakshi Sethi

    EURASIP Journal on Wireless Communications and Networking 2006 2006:093830

    Published on: 3 October 2006

  5. Research Article

    Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

    Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking...

    G. Ginesu, D. D. Giusto and T. Onali

    EURASIP Journal on Wireless Communications and Networking 2006 2006:073685

    Published on: 19 September 2006

  6. Research Article

    Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs

    Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation....

    Giannis F Marias, Konstantinos Papapanagiotou, Vassileios Tsetsos, Odysseas Sekkas and Panagiotis Georgiadis

    EURASIP Journal on Wireless Communications and Networking 2006 2006:078259

    Published on: 1 August 2006

  7. Research Article

    Key Management for Secure Multicast over IPv6 Wireless Networks

    Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over ...

    Win Aye and Mohammad Umar Siddiqi

    EURASIP Journal on Wireless Communications and Networking 2006 2006:061769

    Published on: 17 July 2006

  8. Research Article

    Multiple-Channel Security Architecture and its Implementation over SSL

    This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enable...

    Yong Song, Konstantin Beznosov and Victor C. M. Leung

    EURASIP Journal on Wireless Communications and Networking 2006 2006:085495

    Published on: 25 June 2006

  9. Research Article

    ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs

    Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with tradition...

    Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou

    EURASIP Journal on Wireless Communications and Networking 2006 2006:096157

    Published on: 6 June 2006

  10. Research Article

    On Optimizing Compatible Security Policies in Wireless Networks

    This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible...

    Scott C-H Huang, Kia Makki and Niki Pissinou

    EURASIP Journal on Wireless Communications and Networking 2006 2006:023728

    Published on: 20 April 2006

  11. Research Article

    SeGrid: A Secure Grid Framework for Sensor Networks

    In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since ...

    Xiuzhen Cheng, Fang Liu and Fengguang An

    EURASIP Journal on Wireless Communications and Networking 2006 2006:090652

    Published on: 18 April 2006

  12. Research Article

    A Robust on-Demand Path-Key Establishment Framework via Random Key Predistribution for Wireless Sensor Networks

    Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impr...

    Guanfeng Li, Hui Ling, Taieb Znati and Weili Wu

    EURASIP Journal on Wireless Communications and Networking 2006 2006:091304

    Published on: 20 March 2006