Jared Oluoch

  • Citations Per Year
Learn More
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. We propose a new set of equations and(More)
It has been long recognized that no silver bullet exists to achieve both security and memorability. With the addition of requirements, the task of designing authentication schemes for mobile devices becomes more challenging. We propose a Multi-dimensionAl Password Scheme (MAPS) for mobile authentication. MAPS fuses information from multiple dimensions to(More)
Collaborative wormhole attacks create links within MANETs, and tunnel data to undesired destinations through the links. By doing so, wormholes compromise network performance, security, and may even bring down an entire network. We evaluate the impacts of collaborative wormhole attacks in MANETs, through simulations using AODV protocol in NS2. At first, we(More)
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the(More)
  • 1