Securing DSR against wormhole attacks in multirate ad hoc networks
暂无分享,去创建一个
Yi Mu | Willy Susilo | Raad Raad | Shams Qazi | Y. Mu | W. Susilo | R. Raad | S. Qazi
[1] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[2] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[3] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[4] Jean-Philippe Babau,et al. Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[5] Dezun Dong,et al. Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks , 2009, ICNP.
[6] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[7] Jean-Marc Robert,et al. Preventing Layer-3 wormhole attacks in ad-hoc networks with multipath DSR , 2009, 2009 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop.
[8] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[9] Adel Saeed Alshamrani. PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
[10] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .
[11] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[12] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.
[13] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).
[14] G. Vinitha,et al. An Approach Towards Detection of Wormhole Attack in Sensor Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.
[15] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[16] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[17] Lei Guo,et al. Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.
[18] Bharat K. Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[19] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[20] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[21] Majid Khabbazian,et al. NIS02-1: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure , 2006, IEEE Globecom 2006.
[22] Lakhmi C. Jain,et al. Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..
[23] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.