The performance of a watchdog protocol for wireless network security.
Jin Wook LeeYann-Hang LeeViolet R. SyrotiukPublished in: Int. J. Wirel. Mob. Comput. (2007)
Keyphrases
- network security
- wired networks
- end hosts
- packet filtering
- intrusion detection
- computer networks
- network traffic
- traffic analysis
- intrusion detection system
- information security
- wireless networks
- risk assessment
- dos attacks
- wireless sensor
- anomaly detection
- security breaches
- anti phishing
- situation assessment
- security policies
- wireless communication
- ip networks
- security protection
- tcp ip
- information technology
- mobility management
- multi hop
- cross layer
- lightweight
- mobile devices
- physical layer
- mobile nodes
- network access
- feature selection
- mobile users
- wireless sensor networks
- database systems