Circumventing Sinkholes and Wormholes in Wireless Sensor Networks
暂无分享,去创建一个
[1] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[2] Samir R. Das,et al. On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[3] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[4] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[5] Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[6] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[7] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[8] Joe F. Chicharo,et al. Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[9] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[11] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[12] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[13] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[14] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[15] Alan D. Ross,et al. Network Security Essentials , 2003 .
[16] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] Anna Hać,et al. Wireless Sensor Network Designs , 2003 .
[19] S. Carter. Secure Position Aided Ad Hoc Routing , 2003 .
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[22] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[23] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[24] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[25] Ian T. Downard,et al. Simulating Sensor Networks in NS-2 , 2004 .
[26] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[27] Amitava Datta,et al. Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[28] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[29] Chris McDonald,et al. Secure Pervasive Computing without a Trusted Third Party , 2004, The IEEE/ACS International Conference on Pervasive Services.
[30] Chris McDonald,et al. Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .