Analysis and prevention of wormhole attack using trust and reputation management scheme in MANET
暂无分享,去创建一个
[1] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[2] Neha Agrawal,et al. RTT Based Wormhole Detection Using NS-3 , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[3] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[4] King Sun Chan,et al. RTT-TC: A topological comparison based method to detect wormhole attacks in MANET , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[5] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[6] Seung-Woo Seo,et al. WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.
[7] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[8] Soo Young Shin,et al. Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).
[9] Prashant Krishnamurthy,et al. DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.
[10] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[11] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[12] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[13] Magdy S. El-Soudani,et al. An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[14] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[15] Preeti Nagrath,et al. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[16] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[17] Varsha Singh,et al. MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[18] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Mohsin Iftikhar,et al. Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks , 2014, ADHOC-NOW Workshops.
[20] Weijie Liu,et al. Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.