Prevention of Wormhole Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[2] Majid Naderi,et al. New approach for detection and defending the wormhole attacks in Wireless ad hoc networks , 2010, 2010 18th Iranian Conference on Electrical Engineering.
[3] Heejo Lee,et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[4] Neelima Gupta,et al. FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[5] Jalel Ben-Othman,et al. Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[6] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Honglong Chen,et al. Secure localization against wormhole attacks using conflicting sets , 2010, International Performance Computing and Communications Conference.
[8] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[9] Prashant Krishnamurthy,et al. SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[10] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[11] Neelima Gupta,et al. SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks , 2008, 2008 The Fourth International Conference on Wireless and Mobile Communications.
[12] Brahim Bensaou,et al. Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[13] Tassos Dimitriou,et al. Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.
[14] Magdy S. El-Soudani,et al. An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[15] D. Sreenivasa Rao,et al. A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .
[16] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[17] C. Shobha Bindu,et al. Detection and Prevention of Layer-3 Wormhole Attacks on Boundary State Routing in Ad Hoc Networks , 2010, 2010 International Conference on Advances in Computer Engineering.
[18] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[19] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[20] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.