Secure communication method in mobile wireless networks
暂无分享,去创建一个
[1] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[2] Mika Ishizuka,et al. Achieving power-law placement in wireless sensor networks , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[5] Masaki Aida,et al. Preventing Resource Exhaustion Attacks in Ad Hoc Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Catherine A. Meadows,et al. A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.