A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology
暂无分享,去创建一个
[1] Thomas L. Saaty,et al. DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .
[2] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[3] Katina Michael,et al. Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..
[4] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[5] Sherali Zeadally,et al. A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) , 2012, Electron. Commer. Res..
[6] Preeti Nagrath,et al. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[7] Sherali Zeadally,et al. Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks , 2010, Electron. Commer. Res..
[8] Bin Wang,et al. Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..
[9] Tomoya Enokido,et al. Trustworthy Group Making Algorithm in Distributed Systems , 2011, Human-centric Computing and Information Sciences.
[10] Zuowen Tan. An efficient identity-based tripartite authenticated key agreement protocol , 2012, Electron. Commer. Res..
[11] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[12] Michael P. Howarth,et al. Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..
[13] Weijie Liu,et al. Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[15] Nilmini Wickramasinghe,et al. Security of a Mobile Transaction: A Trust Model , 2004, Electron. Commer. Res..
[16] Tao Zhou. An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..
[17] Jorma Skyttä,et al. Enhanced Augmented IP Routing Protocol (EAIRP) in IPv6 Environment , 2001, Electron. Commer. Res..
[18] Weijie Liu,et al. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks , 2013, Telecommun. Syst..
[19] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Weiwei Sun,et al. A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.