نتایج جستجو برای: Node Capture

تعداد نتایج: 287175  

Mahmoud Ahmadian Mohammad Ehdaie, Mohammad Reza Aref Nikos Alexiou Panos Papadimitratos,

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

2014
Bhavana Butani Piyush Kumar Shukla Sanjay Silakari

Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key information from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing securi...

2007
Wayne Hayes Mart L. Molle

It is well known that the Ethernet medium access control protocol can cause signiicant short-term un-fairness through a mechanism known as the Capture EEect, and that this unfairness condition is worst in heavily loaded Ethernets with a small number of active nodes. Recently, Ramakrishnan and Yang proposed Capture Avoidance Binary Exponential Back-oo (CABEB) to provide 1-packet-per-turn round r...

2012
Jun-Won Ho

Wireless sensor networks are vulnerable to node capture attacks because sensor nodes are usually deployed in unattended manner. Once attacker captures sensor nodes, he can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks are hazardous and should be detected as soon as possible to reduce the harm incurred by them. To meet this need...

Journal: :Ad Hoc Networks 2007
Patrick Tague Radha Poovendran

We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are known to be unsuitable for describing node capture attacks. By defining the amortized initialization overhead cost as well as the cost of capturing a node, we show that finding the node capture attack yielding the minimum co...

2005
Hugh C. Miller Harold C. Strauss

The premature atrial stimulation technique was investigated as a method of measuring sinoatrial conduction time in the rabbit. Fifteen studies were performed in which intracellular recordings were obtained from a sinus node cell and atrial electrical activity was recorded from the crista terminalis by a surface electrogram. An additional ten studies were performed without microelectrode recordi...

2006
Alexander Becher Zinaida Benenson Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort...

2006
Alexander Becher Zinaida Benenson Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Mauro Conti Roberto Di Pietro Luigi V. Mancini Alessandro Mei

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture a node from the network eventually acquiring all the cryptographic material stored in it. Further, the captured node can be reprogrammed by the a...

2005
Romit Roy Choudhury Nitin H. Vaidya

We define a node to be “captured” when its receiver is engaged in receiving a packet that is not intended for that node. A unicast transmission using IEEE 802.11, although intended for a single destination node, can result in capturing several other nodes located within the interference footprint of the transmitter. Capture is mostly unproductive, because the physical layer of a captured node i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید