Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
暂无分享,去创建一个
[1] Srikanth V. Krishnamurthy,et al. Power management for throughput enhancement in wireless ad-hoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[2] Saurabh Upadhyay. Avoiding Wormhole Attack in MANET using Statistical Analysis Approach , 2012 .
[4] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[5] Bharat K. Bhargava,et al. E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[6] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[7] Issa M. Khalil,et al. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.
[8] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[9] Bhupendra Verma,et al. A Behavioral Study of Wormhole Attack in Routing for MANET , 2011 .
[10] S. M. Heemstra de Groot,et al. Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.
[11] Vineet Srivastava,et al. Wormhole Attack Detection in Mobile Ad Hoc Networks , 2012 .
[12] Chunxiao Chigan,et al. AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[13] Prashant Srivastava,et al. Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .
[14] Mooi Choo Chuah,et al. Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[15] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[16] Harish Rohil,et al. Securing MANET against Wormhole Attack using Neighbor Node Analysis , 2013 .
[17] Qun Li,et al. Online power-aware routing in wireless Ad-hoc networks , 2001, MobiCom '01.
[18] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[19] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.
[20] Daya Gupta,et al. Effect of Black Hole Attack on MANET Routing Protocols , 2013 .
[21] Radhika Ranjan Roy,et al. Mobile Ad Hoc Networks , 2011 .
[22] Rituparna Chaki,et al. A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.
[23] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[24] Krishna M. Sivalingam,et al. Design and analysis of low‐power access protocols for wireless and mobile ATM networks , 2000, Wirel. Networks.
[25] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .