[[abstract]]Denial-of-Service (DoS) attacks are serious threats due to the resources constrained property in wireless sensor networks. Jamming attacks are the representative energy-consumption DoS attacks that can be launched easily. Hence, many countermeasures have been proposed to mitigate the damage causing by jamming attacks. In this paper, we first present a novel and powerful jamming attack called mobile jamming attack. Besides, we propose a multi-dataflow topologies scheme that can effectively defend the mobile jamming attack. The simulation results demonstrate that the mobile jamming attack is more devastating than traditional jamming attacks and the proposed defense scheme can effectively alleviate the damage.[[fileno]]203023003002...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communicat...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
xviii, 117 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LiuGThe jamming att...
Wireless mobile nodes have extremely limited resources and are easily vulnerable to Denial of Servic...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communicat...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
xviii, 117 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LiuGThe jamming att...
Wireless mobile nodes have extremely limited resources and are easily vulnerable to Denial of Servic...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wire...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...