Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
暂无分享,去创建一个
[1] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[6] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[7] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[9] Robert Tappan Morris,et al. Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..
[10] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[11] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[12] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[13] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[14] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[15] Bharat K. Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[16] William Stafford Noble,et al. Support vector machine , 2013 .
[17] Bharat Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks: Research Articles , 2006 .
[18] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[19] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[20] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM '07.
[21] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[22] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[23] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[24] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[25] Fan Wu,et al. Incentive-compatible opportunistic routing for wireless networks , 2008, MobiCom '08.
[26] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[27] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[28] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[29] L Wang,et al. Opportunistic Routing in MultiHop Wireless Networks , 2010 .
[30] T. Ho,et al. On Linear Network Coding , 2010 .
[31] Lang Tong,et al. Timing-based localization of in-band wormhole tunnels in MANETs , 2010, WiSec '10.
[32] Zhiwei Li,et al. Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding* , 2011 .
[33] Michael Gastpar,et al. Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.
[34] Suhas N. Diggavi,et al. Wireless Network Information Flow: A Deterministic Approach , 2009, IEEE Transactions on Information Theory.
[35] Reza Curtmola,et al. Entropy attacks and countermeasures in wireless network coding , 2012, WISEC '12.
[36] Shan Suthaharan,et al. Support Vector Machine , 2016 .