Defense against packet dropping attacks in opportunistic networks
暂无分享,去创建一个
[1] Jaydip Sen,et al. A distributed protocol for detection of packet dropping attack in mobile ad hoc networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[2] Donald F. Towsley,et al. Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.
[3] Peng Yang,et al. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[4] Cristina Nita-Rotaru,et al. JANUS: towards robust and malicious resilient routing in hybrid wireless networks , 2004, WiSe '04.
[5] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[6] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[7] Yoon-Hwa Choi,et al. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.
[8] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[9] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[10] Robin Doss,et al. Comparative study of routing protocols for opportunistic networks , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).
[11] Elisa Bertino,et al. A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[12] Sanjay Kumar Dhurandher,et al. Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[13] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[14] Peng Yang,et al. Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[15] Jie Yang,et al. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[16] Xin Zhang,et al. Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.