Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack
暂无分享,去创建一个
[1] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[2] N. Sarma,et al. SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY , 2010 .
[3] Rabi N. Mahapatra,et al. Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[4] Saurabh Singh,et al. Security For Wireless Sensor Network , 2011 .
[5] Magdy S. El-Soudani,et al. An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[6] Gunhee Lee,et al. An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[7] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[8] Kashyap Patel,et al. Detection of Wormhole Attack In Wireless Sensor Network , 2013 .
[9] Ali Modirkhazeni,et al. Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.
[10] Devesh C. Jinwala,et al. Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.
[11] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[12] K. Vijaya. Secure 2ACK routing protocol in Mobile Ad Hoc Networks , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.