Search
Now showing items 1-4 of 4
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks
(Institute of Electrical and Electronics Engineers (IEEE), 2015-10-05)
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes ...
Usability of activity-based and image-based challenge questions in online student authentication
(Springer Nature, 2015-07-21)
There has been a renewed interest in secure authentication of students in online examinations. Online examinations are important and high stake assets in the context of remote online learning. The logistical challenges and ...
A Dynamic Reputation Management System for Mobile Ad Hoc Networks
(2015-04-17)
Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, ...
An evaluation of break-the-glass access control model for medical data in wireless sensor networks
(Institute of Electrical and Electronics Engineers (IEEE), 2015-01)
Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. ...