A comprehensive review on wormhole attacks in MANET
暂无分享,去创建一个
[1] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[2] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[3] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[4] Chi-Sung Laih,et al. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.
[5] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[6] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[7] John S. Baras,et al. Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[8] Rituparna Chaki,et al. A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.
[9] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .
[10] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[11] Neeraj Mittal,et al. WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks , 2008, WASA.
[12] Khin Sandar Win,et al. Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .
[13] Djamel Djenouri,et al. On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.
[14] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[15] Jaber Karimpour,et al. Wormhole Attack in Wireless Ad-Hoc Networks , 2012 .
[16] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.