A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks
暂无分享,去创建一个
[1] Jagpreet Singh,et al. Performance Analysis of MANET under Blackhole Attack , 2009, 2009 First International Conference on Networks & Communications.
[2] J. Scolforo,et al. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs , 2022 .
[3] Bin Wang,et al. Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..
[4] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).
[5] Shahram Jamali,et al. Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .
[6] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[7] Pramod Kumar Soni,et al. A Survey of Mobile Ad Hoc Network Attacks , 2013 .
[8] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[9] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .
[10] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[11] Gunhee Lee,et al. An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[12] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[14] Rutvij H. Jhaveri,et al. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs - ERRATA , 2012 .
[15] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[16] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[17] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[18] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[19] A. Amara Korba,et al. Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[20] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[21] S. M. Ramesh,et al. Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET , 2014, Wirel. Networks.
[22] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[23] Yi Mu,et al. Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..
[24] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[25] Bharat K. Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[26] Xice Sun,et al. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..
[27] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[28] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[29] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[30] H. Chris Tseng,et al. Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.
[31] Magdy S. El-Soudani,et al. Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[32] Xia Wang. Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[33] Nabendu Chaki,et al. A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[34] Uyen Trang Nguyen,et al. Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[35] D. Sreenivasa Rao,et al. A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .
[36] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[37] Tao Zhou. An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..
[38] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[39] A. Khatkar,et al. Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[40] Soo Young Shin,et al. Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).
[41] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[42] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[43] Katina Michael,et al. Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..
[44] Hong Liang,et al. Defending against wormhole attack in OLSR , 2006 .
[45] Rajendra V. Boppana,et al. On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[46] JooSeok Song,et al. Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.
[47] Rutvij H. Jhaveri,et al. MANET Routing Protocols and Wormhole Attack against AODV , 2010 .
[48] Ali Modirkhazeni,et al. Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.
[49] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[50] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[51] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[52] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[53] Hyun Jin Kim,et al. Detecting Selfish Behavior in a Cooperative Commons , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[54] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[55] Dr Pradip M. Jawandhiya. A Survey of Mobile Ad Hoc Network Attacks , 2019 .