Skip to main content

Wireless Network Security 2006

  1. Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless envi...

    Authors: Chetan Nanjunda Mathur, Karthik Narayan and K. P. Subbalakshmi
    Citation: EURASIP Journal on Wireless Communications and Networking 2007 2006:042871
  2. This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outline...

    Authors: Floriano De Rango, Dionigi Cristian Lentini and Salvatore Marano
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:047453
  3. Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium a...

    Authors: Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang and Sakshi Sethi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:093830
  4. Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking...

    Authors: G. Ginesu, D. D. Giusto and T. Onali
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:073685
  5. Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation....

    Authors: Giannis F Marias, Konstantinos Papapanagiotou, Vassileios Tsetsos, Odysseas Sekkas and Panagiotis Georgiadis
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:078259
  6. Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over ...

    Authors: Win Aye and Mohammad Umar Siddiqi
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:061769
  7. This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enable...

    Authors: Yong Song, Konstantin Beznosov and Victor C. M. Leung
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:085495
  8. Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with tradition...

    Authors: Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:096157
  9. This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible...

    Authors: Scott C-H Huang, Kia Makki and Niki Pissinou
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:023728
  10. In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since ...

    Authors: Xiuzhen Cheng, Fang Liu and Fengguang An
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:090652
  11. Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impr...

    Authors: Guanfeng Li, Hui Ling, Taieb Znati and Weili Wu
    Citation: EURASIP Journal on Wireless Communications and Networking 2006 2006:091304