Thwarting Attackers in the Wireless Networks without Trusted Authorities
暂无分享,去创建一个
[1] Prateek Mittal,et al. SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.
[2] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[3] Lionel M. Ni,et al. Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[4] Li Shang,et al. Collaborative calibration and sensor placement for mobile sensor networks , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[5] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[6] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[10] Shriram K. Vasudevan,et al. Sybil Guard: Defending Against Sybil Attacks via Social Networks , 2010 .
[11] Paul Gardner-Stephen,et al. The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .
[12] Andreas Haeberlen,et al. Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.
[13] Alec Yasinsac,et al. Peer identification in wireless and sensor networks using signal properties , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[14] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[15] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[16] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[17] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] Mahalingam Ramkumar,et al. An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.
[19] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[20] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.