A cross-layer based intrusion detection approach for wireless ad hoc networks
暂无分享,去创建一个
Sumita Mishra | Aruna Balasubramanian | Geethapriya Thamilarasu | Ramalingam Sridhar | A. Balasubramanian | R. Sridhar | S. Mishra | Geethapriya Thamilarasu
[1] Yang Li,et al. Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Jan M. Rabaey,et al. Distributed algorithms for transmission power control in wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] George Kesidis,et al. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[5] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[6] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Yih-Chun Hu,et al. Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..