Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET
暂无分享,去创建一个
[1] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[2] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[3] Mike Burmester,et al. On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.
[4] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[5] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .
[6] Heejo Lee,et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[7] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[8] J. K. Mandal,et al. QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack , 2013 .
[9] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[10] Pallavi Sharma,et al. An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[13] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.