Advertisement

Introduction

  • Jie Yang
  • Yingying ChenEmail author
  • Wade Trappe
  • Jerry Cheng
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

As computing and networking shift from the static model of the wired Internet toward the new and exciting anytime-anywhere service model of the mobile Internet, information will be gathered by wireless devices and made available to mobile users to consume or process on-the-go. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of such wireless information systems to support a broad array of pervasive applications including emergency rescue and recovery, asset monitoring and tracking, mobile social networks, smart healthcare, and battlefield protection.

Keywords

Mobile Agent Receive Signal Strength Wireless Device Attack Detection Mobile Social Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28.Google Scholar
  2. 2.
    F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.Google Scholar
  3. 3.
    D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.Google Scholar
  4. 4.
    Q. Li and W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Jie Yang
    • 1
  • Yingying Chen
    • 2
    Email author
  • Wade Trappe
    • 3
  • Jerry Cheng
    • 4
  1. 1.Department of Computer Science and EngineeringOakland UniversityRochesterUSA
  2. 2.Department of Electrical & Computer EngineeringStevens Institute of TechnologyHobokenUSA
  3. 3.Wireless Information Network LabRutgers, The State University of New JerseyNorth BrunswickUSA
  4. 4.Rutgers, The State University of New JerseyNew BrunswickUSA

Personalised recommendations