Intelligent honeypot agent for blackhole attack detection in Wireless Mesh Networks
暂无分享,去创建一个
[1] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[2] Rami G. Melhem,et al. Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks , 2006, J. Parallel Distributed Comput..
[3] Jean-Pierre Hubaux,et al. Securing wireless mesh networks , 2006, IEEE Wireless Communications.
[4] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[5] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[6] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[7] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[9] Zdravko Karakehayov,et al. Security - Lifetime tradeoffs for wireless sensor networks , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).
[10] Nagesh Nandiraju,et al. Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky , 2007, IEEE Wireless Communications.
[11] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[12] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[13] D.P. Agrawal,et al. A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[14] Dharma P. Agrawal,et al. Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[15] Dharma P. Agrawal,et al. Ad Hoc and Sensor Networks: Theory and Applications , 2006 .
[16] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.