By Topic

Selected Areas in Communications, IEEE Journal on

Issue 2 • Date Feb. 2006

Filter Results

Displaying Results 1 - 22 of 22
  • Table of contents

    Publication Year: 2006 , Page(s): c1 - c4
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • IEEE Journal on Selected Areas in Communications publication information

    Publication Year: 2006 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • Guest Editorial Security in Wireless Ad Hoc Networks

    Publication Year: 2006 , Page(s): 217 - 220
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (696 KB) |  | HTML iconHTML  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure positioning in wireless networks

    Publication Year: 2006 , Page(s): 221 - 232
    Cited by:  Papers (71)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (648 KB) |  | HTML iconHTML  

    So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HiRLoc: high-resolution robust localization for wireless sensor networks

    Publication Year: 2006 , Page(s): 233 - 246
    Cited by:  Papers (53)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1000 KB) |  | HTML iconHTML  

    In this paper, we address the problem of robustly estimating the position of randomly deployed nodes of a wireless sensor network (WSN), in the presence of security threats. We propose a range-independent localization algorithm called high-resolution range-independent localization (HiRLoc), that allows sensors to passively determine their location with high resolution, without increasing the numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-based compromise-tolerant security mechanisms for wireless sensor networks

    Publication Year: 2006 , Page(s): 247 - 260
    Cited by:  Papers (106)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (560 KB) |  | HTML iconHTML  

    Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCAN: self-organized network-layer security in mobile ad hoc networks

    Publication Year: 2006 , Page(s): 261 - 273
    Cited by:  Papers (47)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for misuse detection in ad hoc Networks-part I

    Publication Year: 2006 , Page(s): 274 - 289
    Cited by:  Papers (20)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (736 KB) |  | HTML iconHTML  

    We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection strategy. Our goal is to maximize the detection rate subject to limited availability of communication and computational resources. We mathematically formulate this problem, and show that computing the optimal solution is NP-hard. Thereafter, we pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for misuse detection in ad hoc networks- part II

    Publication Year: 2006 , Page(s): 290 - 304
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (672 KB) |  | HTML iconHTML  

    We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failure or compromise by intruders. Combining theories of stochastic coverage processes and approximation algorithms, we develop a framework to counter failure of detection modules, while minimizing the resource consumption. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information theoretic framework of trust modeling and evaluation for ad hoc networks

    Publication Year: 2006 , Page(s): 305 - 317
    Cited by:  Papers (152)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1168 KB) |  | HTML iconHTML  

    The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On trust models and trust evaluation metrics for ad hoc networks

    Publication Year: 2006 , Page(s): 318 - 328
    Cited by:  Papers (158)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation of trust evidence in ad hoc networks. Because of the dynamic nature of ad hoc networks, trust evidence may... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Cooperation in clustered mobile ad hoc networks with centralized supervision

    Publication Year: 2006 , Page(s): 329 - 342
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (552 KB) |  | HTML iconHTML  

    Although individual node cooperation is necessary for the correct execution of network protocols in mobile ad hoc networks (MANETs), it is not always guaranteed. In this paper, we present a node reputation scheme aiming at reinforcing node cooperation in MANETs with centralized control. This scheme was designed for centralized ad hoc network architecture (CANA), an ad hoc enhancement to the HIPERL... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure data communication in mobile ad hoc networks

    Publication Year: 2006 , Page(s): 343 - 356
    Cited by:  Papers (29)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (784 KB) |  | HTML iconHTML  

    We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing reliable server pooling in MANET against byzantine adversaries

    Publication Year: 2006 , Page(s): 357 - 369
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    Reliable server pooling (rSerPool) is an architecture and a set of protocols allowing a service provider to run several servers that can reliably provide the same service. Should a particular server fail while providing its service, another server can efficiently replace it. This property is attractive not only for wired but also for wireless networks. However, the unique characteristics of mobile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wormhole attacks in wireless networks

    Publication Year: 2006 , Page(s): 370 - 380
    Cited by:  Papers (94)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID security and privacy: a research survey

    Publication Year: 2006 , Page(s): 381 - 394
    Cited by:  Papers (415)  |  Patents (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and resilient clock synchronization in wireless sensor networks

    Publication Year: 2006 , Page(s): 395 - 408
    Cited by:  Papers (45)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (568 KB) |  | HTML iconHTML  

    Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network applications. Several clock synchronization schemes have been proposed for wireless sensor networks recently to address the resource constraints in such networks. However, most of these techniques assume benign environments, but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on traffic engineering for multi-layer networks

    Publication Year: 2006 , Page(s): 409
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Special issue on cross-layer optimized wireless communications

    Publication Year: 2006 , Page(s): 410
    Save to Project icon | Request Permissions | PDF file iconPDF (143 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Special issue on non-cooperative behavior in networking

    Publication Year: 2006 , Page(s): 411
    Save to Project icon | Request Permissions | PDF file iconPDF (126 KB)  
    Freely Available from IEEE
  • Special issue on optimization of MIMO transceivers for realistic communication networks: Challenges and opportunities

    Publication Year: 2006 , Page(s): 412
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • IEEE Communications Society Information

    Publication Year: 2006 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT