DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi
暂无分享,去创建一个
[1] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[2] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[3] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[4] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[5] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[8] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[9] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[14] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[15] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[16] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[17] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[18] Richard Han,et al. Rapid prototyping of mobile input devices using wireless sensor nodes , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[19] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[20] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[21] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[22] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[23] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[24] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.