Security based on network topology against the wiretapping attack.

In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. Whether or not some meaningful information is obtained by tapping a wireless connection depends the security protocols used. One may use cryptographic techniques to secure the communications. In this a...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:IEEE Wireless communications 11, 1 (2004).
المؤلف الرئيسي: Jain, K.
التنسيق: مقال
اللغة:الإنجليزية
الموضوعات: