Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network
暂无分享,去创建一个
[1] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[2] A. Khatkar,et al. Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[3] Varsha Singh,et al. MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[4] Gurmeet Kaur,et al. Performance analysis of aodv for wormhole attack using different mobility models , 2014 .
[5] Pallavi Khatri,et al. Using identity and trust with key management for achieving security in Ad hoc Networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[6] Uma Rathore Bhatt,et al. MIKBIT- Modified DSR for MANET , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[7] Hitesh Gupta,et al. A dynamic hybrid approach for wormhole detection and prevention , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[8] S. Vanthana,et al. Comparative Study of Proactive and Reactive AdHoc Routing Protocols Using Ns2 , 2014, 2014 World Congress on Computing and Communication Technologies.
[9] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[10] Shailendra Singh,et al. Improve Performance DSR Protocol by Application of Mobile Agent , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[11] Tao Jiang,et al. Intrusion detection of in-band wormholes in MANETs using advanced statistical methods , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[12] Upena D. Dalal,et al. Notice of Violation of IEEE Publication PrinciplesA Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.
[13] Azzam Mourad,et al. Detecting attacks in QoS-OLSR protocol , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[14] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[15] K. V. Krishna Kishore,et al. Performance estimation of DSR, DSDV and AODV in TCP, UDP and SCTP , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).
[16] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[17] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).