Secure interoperable architecture construction for overlay networks
暂无分享,去创建一个
[1] Vineet Srivastava,et al. Wormhole Attack Detection in Mobile Ad Hoc Networks , 2012 .
[2] Prateek Thakral,et al. Detection and Prevention of Wormhole Attack in MANET: A Review , 2013 .
[3] Bing Wu,et al. Countermeasures of Network Layer Attacks in MANETs , 2011 .
[4] Prashant Srivastava,et al. Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .
[5] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[6] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Mooi Choo Chuah,et al. Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[8] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] H. Vincent Poor,et al. Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.