An efficient wormhole attack detection method in wireless sensor networks
暂无分享,去创建一个
[1] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[2] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[3] Rutvij H. Jhaveri,et al. MANET Routing Protocols and Wormhole Attack against AODV , 2010 .
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] Brahim Bensaou,et al. Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[6] Yunhao Liu,et al. WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[7] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[8] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[12] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[13] Bharat K. Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[14] Xiangke Liao,et al. MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[15] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[16] Issa M. Khalil,et al. MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.
[17] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[18] Noureddine Boudriga,et al. A novel secure and multipath routing algorithm in Wireless Sensor Networks , 2010, 2010 International Conference on Data Communication Networking (DCNET).
[19] P. Arun Raj Kumar,et al. A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer , 2013 .
[20] Kashyap Patel,et al. Detection of Wormhole Attack In Wireless Sensor Network , 2013 .
[21] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[22] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[23] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[24] Jie Gao,et al. Local connectivity tests to identify wormholes in wireless networks , 2011, MobiHoc '11.