SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
暂无分享,去创建一个
[1] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[2] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[3] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[4] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[5] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Sung-Ju Lee,et al. On-demand multicast routing protocol , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[8] Srikanth V. Krishnamurthy,et al. Distributed power control in ad-hoc wireless networks , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).
[9] E. Merzari,et al. Large-Scale Simulations on Thermal-Hydraulics in Fuel Bundles of Advanced Nuclear Reactors , 2007 .
[10] S. Buchegger,et al. Cooperation of Nodes. In: L. Buttyan and J.-P. Hubaux (eds.), Report on a Working Session on Security in Wireless Ad Hoc Networks , 2002 .
[11] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[12] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[13] Sung-Ju Lee,et al. Transmission power control in wireless ad hoc networks: challenges, solutions and open issues , 2004, IEEE Network.
[14] Adam Wolisz,et al. Combined Tuning of RF Power and Medium Access Control for WLANs , 2001, Mob. Networks Appl..
[15] Adam Wolisz,et al. An energy-efficient power control approach for WLANs , 2000, Journal of Communications and Networks.
[16] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[17] Imrich Chlamtac,et al. A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.
[18] George Kesidis,et al. Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[19] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[21] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[22] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[23] بشرى معلا,et al. تحسين معدل إيصال الرزم للبروتوكول On-Demand Multicast Routing Protocol (ODMRP) , 2014 .
[24] 李辉,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[25] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[26] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[27] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[28] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[29] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[30] Rida A. Bazzi,et al. Hop chains: Secure routing and the establishment of distinct identities , 2009, Theor. Comput. Sci..
[31] J. J. Garcia-Luna-Aceves,et al. The core-assisted mesh protocol , 1999, IEEE J. Sel. Areas Commun..
[32] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[33] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.
[34] Mahmoud Naghshineh,et al. Conserving transmission power in wireless ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[35] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.