Specification based IDS for camouflaging wormhole attack in OLSR
暂无分享,去创建一个
[1] Hong Liang,et al. Defending against wormhole attack in OLSR , 2006 .
[2] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[3] Xiuping Liu,et al. Wormhole Detection Algorithm Based on RTT and Neighborhood Information , 2014 .
[4] Mahmuda Naznin. Wireless Sensor Network: Coverage, Scheduling and Optimization , 2009 .
[5] Jean-Philippe Babau,et al. Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[6] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[7] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[8] Chi-Sung Laih,et al. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.
[9] Brahim Bensaou,et al. Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[10] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[11] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.