Statistical wormhole detection for mobile sensor networks
暂无分享,去创建一个
[1] Wei Wang,et al. Using mobile relays to prolong the lifetime of wireless sensor networks , 2005, MobiCom '05.
[2] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[3] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[4] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[5] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[6] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[7] Jie Chen,et al. A Statistical Change Point Model Approach for the Detection of DNA Copy Number Variations in Array CGH Data , 2009, IEEE ACM Trans. Comput. Biol. Bioinform..
[8] S. Muthukrishnan,et al. Surfing Wavelets on Streams: One-Pass Summaries for Approximate Aggregate Queries , 2001, VLDB.
[9] David Tse,et al. Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[11] Sudipto Guha,et al. Approximating a data stream for querying and estimation: algorithms and performance evaluation , 2002, Proceedings 18th International Conference on Data Engineering.
[12] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[13] Panagiotis Papadimitratos,et al. Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.
[14] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[15] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[16] David W. Scott,et al. Multivariate Density Estimation: Theory, Practice, and Visualization , 1992, Wiley Series in Probability and Statistics.
[17] D. W. Scott,et al. Multivariate Density Estimation, Theory, Practice and Visualization , 1992 .
[18] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[19] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[21] Yunhao Liu,et al. WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[22] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[23] Yurong Xu,et al. Analysis of range-free anchor-free localization in a wsn under wormhole attack , 2007, MSWiM '07.
[24] Ozan K. Tonguz,et al. Impact of mobility on the performance of ad hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).