Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] Weijie Liu,et al. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks , 2013, Telecommun. Syst..
[2] Cristina V. Lopes,et al. A survey, classification and comparative analysis of medium access control protocols for ad hoc networks , 2004, IEEE Communications Surveys & Tutorials.
[3] Saurabh Bagchi,et al. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.
[4] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .
[5] Radu State,et al. Management of mobile ad hoc networks: information model and probe-based architecture , 2005, Int. J. Netw. Manag..
[6] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[7] Radu State,et al. Management of mobile ad hoc networks: information model and probe-based architecture , 2005 .
[8] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[9] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Liu Fagui,et al. Research & implementation of uCLinux-based embedded browser , 2007 .
[11] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[12] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[13] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[14] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[15] Heejo Lee,et al. Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).