TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks
暂无分享,去创建一个
Heejo Lee | Young-Koo Lee | Sungyoung Lee | Tran Van Phuong | Le Xuan Hung | Sungyoung Lee | Young-Koo Lee | L. X. Hung | Heejo Lee | T. V. Phuong
[1] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[2] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[3] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[6] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[7] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[8] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[9] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[10] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[11] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[12] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[13] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[14] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[15] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[16] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[17] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).