Mostrando 3 resultados de: 3
Subtipo de publicación
Article(3)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopus