Local connectivity tests to identify wormholes in wireless networks
暂无分享,去创建一个
Jie Gao | Xiaomeng Ban | Rik Sarkar | Jie Gao | Xiaomeng Ban | Rik Sarkar
[1] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[2] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[5] Anna Scaglione,et al. Opportunistic large arrays: cooperative transmission in wireless multihop ad hoc networks to reach far distances , 2003, IEEE Trans. Signal Process..
[6] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[7] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[8] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[9] Jie Gao,et al. Boundary recognition in sensor networks by topological methods , 2006, MobiCom '06.
[10] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[11] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[12] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[13] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[15] David Eppstein,et al. Arboricity and Bipartite Subgraph Listing Algorithms , 1994, Inf. Process. Lett..
[16] Yunhao Liu,et al. WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[17] Lionel M. Ni,et al. A survey of wormhole routing techniques in direct networks , 1993, Computer.
[18] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[19] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[20] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.