Colluding injected attack in mobile ad-hoc networks
暂无分享,去创建一个
[1] Amitabh Mishra,et al. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[2] Juan-Carlos Cano,et al. Analysis of the interaction between TCP variants and routing protocols in MANETs , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).
[3] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[4] Donald F. Towsley,et al. Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[6] Sidi-Mohammed Senouci,et al. Effect of Ad Hoc Routing Protocols on TCP Performance within MANETs , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[7] Eui-nam Huh,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[8] Quanli Wei,et al. The Design and Implementation of the Minimal M2M Terminal Based on the SIM4100 Wireless Module , 2010, 2010 Third International Symposium on Information Processing.
[9] Tharam S. Dillon,et al. A Secure Key Management Model for Wireless Mesh Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[10] Levente Buttyán,et al. Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.
[11] M. Dohler,et al. Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[12] Wen Li,et al. Design of M2M Platform Based on J2EE and SOA , 2010, 2010 International Conference on E-Business and E-Government.
[13] Virgil D. Gligor. Handling New Adversaries in Secure Mobile Ad-Hoc Networks , 2007 .
[14] Katarzyna Kosek,et al. Problems with Providing QoS in EDCA Ad-Hoc Networks with Hidden and Exposed Nodes , 2009, IEEE INFOCOM Workshops 2009.
[15] Issa M. Khalil. MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[16] Tatjana Predojev,et al. Energy-delay tradeoff analysis in embedded M2M networks with channel coding , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[17] Jean-Pierre Hubaux,et al. Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.
[18] Ki-Hyung Kim,et al. Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks , 2008, 2008 New Technologies, Mobility and Security.
[19] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[20] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[21] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[22] Shiann-Tsong Sheu,et al. Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN , 2005, First International Conference on Wireless Internet (WICON'05).