An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode
暂无分享,去创建一个
[1] Arindam Ghosh,et al. Analysis of Denial-of-Service attacks on Wireless Sensor Networks using simulation , 2011 .
[2] Liang Hong,et al. Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[3] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[4] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[5] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[6] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[9] Honglong Chen,et al. Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.
[10] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[11] Moutushi Singh,et al. A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network , 2012 .
[12] Xice Sun,et al. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..
[13] Khin Sandar Win,et al. Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .
[14] Rituparna Chaki,et al. A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.
[15] Wang Chunlei,et al. Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .
[16] Gurpreet Singh Josan,et al. Performance Analysis of AODV & DSR Routing Protocols in Wireless Sensor Networks , 2012 .
[17] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.
[18] Rituparna Chaki,et al. IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).
[19] Sommart Khamkleang,et al. PERFORMANCE ANALYSIS OF AODV AND DSR ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS , 2012 .
[20] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[21] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[22] Oivind Kure,et al. Secure Extension to the OLSR protocol , 2004 .
[23] Rakhi Khandelwal,et al. A Survey of Detection of Wormhole Attacks in Wireless Sensor Network , 2014 .
[24] Magdy S. El-Soudani,et al. A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.