Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
暂无分享,去创建一个
[1] Panagiotis Papadimitratos,et al. Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.
[2] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] Henry Leung,et al. Tracking the direction-of-arrival of multiple moving targets by passive arrays: algorithm , 1999, IEEE Trans. Signal Process..
[5] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[6] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[8] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[9] B.D. Van Veen,et al. Beamforming: a versatile approach to spatial filtering , 1988, IEEE ASSP Magazine.
[10] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[11] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[12] Milica Stojanovic,et al. Shallow-Water Acoustic Networks† , 2003 .
[13] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] D. Wright,et al. Marine and coastal geographical information systems , 1999 .
[17] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[18] M. Stojanovic,et al. Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.
[19] Panagiotis Papadimitratos,et al. A practical secure neighbor verification protocol for wireless sensor networks , 2009, WiSec '09.
[20] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[21] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[22] Chenyang Xue,et al. Research of DOA Estimation Based on Single MEMS Vector Hydrophone , 2009, Sensors.
[23] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.