WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
暂无分享,去创建一个
Sun Choi | Jae-Il Jung | Doo-young Kim | Do Hyeon Lee | Doo-young Kim | Jae-il Jung | Sung-Hynp Choi | Do Hyeon Lee
[1] L. Tamilselvan,et al. Solution to Prevent Rushing Attack in Wireless Mobile Ad hoc Networks , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.
[2] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[4] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[5] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[6] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[7] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[8] Rajendra V. Boppana,et al. An adaptive distance vector routing algorithm for mobile, ad hoc networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[9] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[10] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[11] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[12] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[13] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[14] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[15] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[16] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[17] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[18] V. Sankaranarayanan,et al. Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .
[19] D. Jhonson. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .