RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network
暂无分享,去创建一个
[1] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[2] Lei Wang,et al. Defense Technology of Wormhole Attacks Based on Node Connectivity , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).
[3] El Kaissi,et al. DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi , 2005 .
[4] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[5] United Arab Emirates,et al. Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .
[6] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[7] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[8] Saurabh Singh,et al. Security For Wireless Sensor Network , 2011 .
[9] Prashant Krishnamurthy,et al. DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Tae Ho Cho,et al. A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks , 2013 .
[12] Bharat K. Bhargava,et al. E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[13] Lin Yao,et al. An efficient wormhole attack detection method in wireless sensor networks , 2014, Comput. Sci. Inf. Syst..
[14] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[15] Aung Htein Maw,et al. Wormhole Attack Detection in Wireless Sensor Networks , 2008 .
[16] Mohammed Feham,et al. Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).
[17] Yixian Yang,et al. A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .
[18] Sheng Zhong,et al. DAWN: Defending against wormhole attacks in wireless network coding systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[19] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[20] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[21] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Fuxiang Gao,et al. Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.
[23] Neha Agrawal,et al. RTT Based Wormhole Detection Using NS-3 , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[24] Rajpal Singh Khainwar,et al. Enhancement of Routes Performance in MANET Avoiding Tunneling Attack , 2012 .
[25] Bouabdellah Kechar,et al. A time Petri net model for wormhole attack detection in wireless sensor networks , 2013, 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT).
[26] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[27] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[28] Luay A. Wahsheh,et al. Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[29] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[30] Daniel Sora,et al. Security Issues in Wireless Sensor Networks , 2010, Int. J. Online Eng..
[31] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[32] Heejo Lee,et al. Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.
[33] Parli B. Hari,et al. Security issues in Wireless Sensor Networks: Current research and challenges , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[34] Sanjay Kumar Madria,et al. SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.