Skip to main content

Wireless Network Security 2009

  1. Research Article

    Cautious Rating for Trust-Enabled Routing in Wireless Sensor Networks

    Trust aware routing in Wireless Sensor Network (WSN) is an important direction in designing routing protocols for WSN that are susceptible to malicious attacks. The common approach to provide trust aware routi...

    Ismat Maarouf, Uthman Baroudi and A. R. Naseer

    EURASIP Journal on Wireless Communications and Networking 2010 2009:718318

    Published on: 20 January 2010

  2. Editorial

    Wireless Network Security

    Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin and Ding-Zhu Du

    EURASIP Journal on Wireless Communications and Networking 2009 2009:532434

    Published on: 23 December 2009

  3. Research Article

    Secure Media Independent Handover Message Transport in Heterogeneous Networks

    The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile ...

    Jeong-Jae Won, Murahari Vadapalli, Choong-Ho Cho and VictorCM Leung

    EURASIP Journal on Wireless Communications and Networking 2009 2009:716480

    Published on: 16 December 2009

  4. Research Article

    Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

    The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the nod...

    Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei

    EURASIP Journal on Wireless Communications and Networking 2009 2009:945943

    Published on: 13 September 2009

  5. Review Article

    Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures

    Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of b...

    Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng and Jingyuan Zhang

    EURASIP Journal on Wireless Communications and Networking 2009 2009:692654

    Published on: 13 September 2009

  6. Research Article

    A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

    Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of us...

    Sehwa Song, Hyoung-Kee Choi and Jung-Yoon Kim

    EURASIP Journal on Wireless Communications and Networking 2009 2009:957690

    Published on: 29 June 2009

  7. Research Article

    Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas

    In a hostile environment, it is important for a transmitter to make its wireless transmission invisible to adversaries because an adversary can detect the transmitter if the received power at its antennas is s...

    Xiaofeng Lu, Don Towsley, Pietro Lio', Fletcher Wicker and Zhang Xiong

    EURASIP Journal on Wireless Communications and Networking 2009 2009:256714

    Published on: 8 June 2009

  8. Research Article

    Pre-Authentication Schemes for UMTS-WLAN Interworking

    Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover...

    Ali Al Shidhani and Victor C. M. Leung

    EURASIP Journal on Wireless Communications and Networking 2009 2009:806563

    Published on: 8 June 2009

  9. Research Article

    In Situ Key Establishment in Large-Scale Sensor Networks

    Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailabili...

    Yingchang Xiang, Fang Liu, Xiuzhen Cheng, Dechang Chen and David H. C. Du

    EURASIP Journal on Wireless Communications and Networking 2009 2009:427492

    Published on: 31 May 2009

  10. Research Article

    Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks

    A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital ...

    Christine Laurendeau and Michel Barbeau

    EURASIP Journal on Wireless Communications and Networking 2009 2009:128679

    Published on: 24 May 2009