Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within direct radio communication, is a building block of network protocols and applications, and its vulnerability can severely compromise their functionalities. A number of proposals to secure ND have been published, but none have analyzed the problem formally. In this paper, we contribute such an analysis: We build a formal model capturing salient characteristics of wireless systems, most notably obstacles and interference, and we provide a specification of a basic variant of the ND problem. Then, we derive an impossibility result for a general class of protocols we t...
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
© ACM, (2008). This is the author’s version of the work. It is posted here by permission of ACM for ...
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devi...
Pervasive computing systems will likely be deployed in the near future, with the proliferation of wi...
Abstract. Wireless Sensor Networks are increasingly being used for data monitoring in commercial, in...
The problem of determining which sensors are neighbors of a given one in a wireless network operatin...
Neighbor discovery is essential for the process of self-organization of a wireless network, where al...
The surge of proximity-based applications on mobile de-vices has promoted the need for effective nei...
A growing number of ad hoc networking protocols and location-aware services require that mobile node...
This paper studies the problem of neighbor discovery in wireless networks, namely, each node wishes ...
Abstract—In this paper, we propose a wormhole attack resistant secure neighbor discovery (SND) schem...
ABSTRACT In this paper, we propose a wormhole attack resistant secure neighbor discovery (SND) schem...
2015-08-04The neighbor discovery in wireless networks is the problem of devices identifying other de...
International audienceIn wireless multi-hop networks, hello protocols for neighbor discovery are a b...
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
© ACM, (2008). This is the author’s version of the work. It is posted here by permission of ACM for ...
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devi...
Pervasive computing systems will likely be deployed in the near future, with the proliferation of wi...
Abstract. Wireless Sensor Networks are increasingly being used for data monitoring in commercial, in...
The problem of determining which sensors are neighbors of a given one in a wireless network operatin...
Neighbor discovery is essential for the process of self-organization of a wireless network, where al...
The surge of proximity-based applications on mobile de-vices has promoted the need for effective nei...
A growing number of ad hoc networking protocols and location-aware services require that mobile node...
This paper studies the problem of neighbor discovery in wireless networks, namely, each node wishes ...
Abstract—In this paper, we propose a wormhole attack resistant secure neighbor discovery (SND) schem...
ABSTRACT In this paper, we propose a wormhole attack resistant secure neighbor discovery (SND) schem...
2015-08-04The neighbor discovery in wireless networks is the problem of devices identifying other de...
International audienceIn wireless multi-hop networks, hello protocols for neighbor discovery are a b...
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
© ACM, (2008). This is the author’s version of the work. It is posted here by permission of ACM for ...