Wormhole attack prevention using clustering and digital signatures in reactive routing
暂无分享,去创建一个
[1] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[2] Gunhee Lee,et al. An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[3] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Chris McDonald,et al. Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks , 2006, Int. J. Netw. Secur..
[5] Sanjay Keer,et al. To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[6] D. Jhonson. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .
[7] Majid Naderi,et al. New approach for detection and defending the wormhole attacks in Wireless ad hoc networks , 2010, 2010 18th Iranian Conference on Electrical Engineering.
[8] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[9] Jie Gao,et al. Detecting wormhole attacks in wireless networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.