Modeling the Wormhole Attack in Underwater Sensor Network
暂无分享,去创建一个
[1] Reza Curtmola,et al. On the Survivability of Routing Protocols in Ad Hoc Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Peng Xie,et al. VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks , 2006, Networking.
[3] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[4] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[5] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[6] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.