Security for Wireless Network: A Challenging Task
Abstract
Keywords: WLAN, WMAN, wormhole, hacker
Full Text:
PDFReferences
Abdel-Karim R., Al T. Security in Wireless Data Networks: A Survey Paper. 2006.
Xiao Y, Frank H.L., Chen H. Handbook of Security and Networks. 2011; 10–2p.
Palihakkara A. Wireless Networks. Primerose Tech Thoughts. 2011 March 14.
Yu B., Xiao B. Detecting selective forwarding attacks in wireless sensor networks. In: Proc. of the 20th International Parallel and Distributed Processing Symposium; Rhodes Island, Greece; 2006. 1218–30p.
Brown J., Jiang X., Du X. Detection of selective forwarding attacks in heterogeneous sensor networks. In ICC. 2008; 1583–7p.
Hai T.H., Huh E.N. Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbour knowledge. In NCA. 2008; 325–31p.
Sun H.M., Chen C.M., Hsiao Y.C. Un-mask: Utilizing neighbour monitoring for attack mitigation in multi-hop wireless sensor networks. 2010; 8: 148–64p.
Zia T., Zomaya A.Y. Security issues in wireless networks. International Conference on Systems and Networks Communications; Oct 29–Nov 3; 2006.
Kalita H.K., Kar A. Wireless Sensor Network Security Analysis. International journal of computer science & information Technology (IJCSIT). 1–10p.
Taterh S., Yadav K.P., Sharma S.K. Security Requirement Elicitation Phase of Secure Software Development Life Cycle. International Journal of Research Review in Engineering, Science and Technology. 2013 March; 2(1).
DOI: https://doi.org/10.37628/ijowns.v1i1.3
Refbacks
- There are currently no refbacks.