SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[2] Maria A. Gorlatova,et al. Review of Existing Wormhole Attack Discovery Techniques , 2006 .
[3] David L. Mills. A Precision Radio Clock for WWV Transmissions , 2004 .
[4] Chia-Mei Chen,et al. Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[5] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[6] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[7] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[8] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[9] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[10] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[11] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[12] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] F. Makedon,et al. Distributed Wormhole Attack Detection in Wireless Sensor Networks , 2007 .
[14] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[15] Yurong Xu,et al. Detecting Wormhole Attacks in Wireless Sensor Networks , 2007, Critical Infrastructure Protection.
[16] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[17] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[18] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[19] Weichao Wang,et al. Interactive Wormhole Detection and Evaluation , 2007, Inf. Vis..
[20] Chuang Lin,et al. Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-Hoc Networks , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing (GCC'06).
[21] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[22] David L. Mills. A Computer-Controlled LORAN-C Receiver for Precision Timekeeping , 1998 .
[23] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[24] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[25] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[26] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.