2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks 2006
DOI: 10.1109/sahcn.2006.288535
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…There is a fact that only transmitters can potentially be eavesdropped by malicious nodes since only they are sending messages. Thus, we will only consider transmitters 2 and malicious nodes in the following analysis.…”
Section: A Eavesdropping Activity In Wireless Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a fact that only transmitters can potentially be eavesdropped by malicious nodes since only they are sending messages. Thus, we will only consider transmitters 2 and malicious nodes in the following analysis.…”
Section: A Eavesdropping Activity In Wireless Networkmentioning
confidence: 99%
“…The reconnaissance, also named the eavesdropping activity, has attracted considerable attention recently since many ad-versary attacks often follow the eavesdropping activity, e.g., hear-and-fire attacks [2]. Specifically, there are two types of eavesdropping attacks in wireless ad hoc networks [3]: (i) Passive Eavesdropping, in which the malicious nodes detect the information by listening to the message transmission in the broadcasting wireless medium; (ii) Active Eavesdropping, where the malicious nodes actively grab the information via sending queries to transmitters by disguising themselves as friendly nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Eavesdropping in CPS means that an attacker may intercept any information communicated by the cyber physical system [43]. When launching an eavesdropping attack, attacker doesn't interfere with the working of CPS and just observes its operation.…”
Section: Eavesdroppingmentioning
confidence: 99%
“…Eavesdropping [20] is a type of passive attacks. In this a message sent by a node as the sender and can be heard by the node as a receiver within radio range.…”
Section: Example: Eavesdroppingmentioning
confidence: 99%