Wormhole attacks in MANET
暂无分享,去创建一个
[1] David C. Wyld,et al. Advances in Computer Science, Engineering & Applications , 2012 .
[2] Sajjad Abazari Aghdam,et al. Collaborative techniques for detecting wormhole attack in MANETs , 2011, 2011 International Conference on Research and Innovation in Information Systems.
[3] Subhashis Banerjee,et al. WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE , 2014 .
[4] S. Nandi,et al. M - learning in university campus scenario - Design and implementation issues , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).
[5] Xiangke Liao,et al. WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks , 2013, 2013 42nd International Conference on Parallel Processing.
[6] Ravinder Singh Sawhney,et al. Multi Hop Routing in Wireless Mobile Networks using Ant Colony Optimization , 2013 .
[7] Devesh C. Jinwala,et al. Prevention of Wormhole Attack in Wireless Sensor Network , 2011, ArXiv.
[8] S. Albert Rabara,et al. Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2 , 2011 .
[9] Anshika Garg,et al. A Study on Wormhole Attack in MANET , 2014 .
[10] John S. Baras,et al. Wormhole detection using channel characteristics , 2012, 2012 IEEE International Conference on Communications (ICC).
[11] E.A. Mary Anita,et al. A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs , 2010, 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES.
[12] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[13] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[14] Djamel Djenouri,et al. On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.
[15] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[16] Zurina Mohd Hanapi,et al. A review on wormhole attacks in MANET , 2015 .
[17] Prashant Srivastava,et al. Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .
[18] Jorge Ortiz,et al. Behavior of Elliptic Curve , 2011 .
[19] Ashwin Gumaste,et al. Message Scheduling on a Wormhole-Switched Linear Client-Server Network , 2006, ISCA PDCS.
[20] Sheng Ma,et al. A comprehensive comparison between virtual cut-through and wormhole routers for cache coherent Network on-Chips , 2014, IEICE Electron. Express.
[21] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Neelima Gupta,et al. FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[23] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[24] Paulo Veríssimo,et al. Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.
[25] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[26] Soo Young Shin,et al. Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).
[27] Brijesh Kumar Chaurasia,et al. Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach , 2012 .
[28] Pallapa Venkataram,et al. Locating the Attacker of Wormhole Attack by Using the Honeypot , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[29] Preeti Nagrath,et al. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[30] S. Smys,et al. Efficient self-organized backbone formation in mobile ad hoc networks (MANETs) , 2012, Comput. Electr. Eng..
[31] Gunhee Lee,et al. An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid , 2012 .
[32] Majid Khabbazian,et al. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[33] Lin Yao,et al. An efficient wormhole attack detection method in wireless sensor networks , 2014, Comput. Sci. Inf. Syst..
[34] Subrat Kar,et al. WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.
[35] Venkateswara Nagar,et al. Effectiveness of Intervention Strategies in Enhancing Self-Esteem among Engineering Students , 2012 .
[36] Saadiah Yahya,et al. Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).
[37] Aashima Aashima,et al. Detection and Prevention of Wormhole Attack in MANET Using DSR Protocol , 2014 .
[38] Sanjay Keer,et al. To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[39] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[40] Jingjun Zhao,et al. A Two-Phase Security Algorithm for Hierarchical Sensor Networks , 2011 .
[41] Farrukh Aslam Khan,et al. Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.
[42] Teddy Mantoro,et al. Mitigation of Wormhole Attack in Wireless Sensor Networks , 2012 .
[43] Amarjit Malhotra,et al. Wormhole attack prevention using clustering and digital signatures in reactive routing , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.
[44] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[45] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[46] İnan Güler,et al. A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .
[47] Heejo Lee,et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[48] Masayuki Nakamura,et al. Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors , 2009 .
[49] Rajni Dubey,et al. Wormhole Attack in Mobile Ad-hoc Network: A Survey , 2015 .
[50] Ali Movaghar-Rahimabadi,et al. A two-phase wormhole attack detection scheme in MANETs , 2014, ISC Int. J. Inf. Secur..
[51] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[52] P. Santhi Thilagam,et al. Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network , 2011, ADCONS.
[53] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[54] Makhlouf Aliouat,et al. Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks , 2012, Trans. Emerg. Telecommun. Technol..
[55] Muhammad Shoaib Siddiqui,et al. Security Issues in Wireless Mesh Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[56] Issa M. Khalil,et al. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.
[57] Magdy S. El-Soudani,et al. A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.
[58] Jaroslaw Krygier,et al. A trust-based information assurance mechanism for military mobile ad-hoc networks , 2014, 2014 20th International Conference on Microwaves, Radar and Wireless Communications (MIKON).
[59] P. Anitha,et al. Detection and Prevention of Wormhole Attacks in Manets Using Path Tracing , 2012 .
[60] Rajpal Singh Khainwar,et al. Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm , 2013 .
[61] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[62] Adel Saeed Alshamrani. PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
[63] Pallavi Sharma,et al. An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[64] Saurabh Upadhyay,et al. Analysis of Wormhole Attack in AODV based MANET Using OPNET Simulator , 2012 .
[65] F. Maan,et al. Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons , 2011, 2011 Wireless Advanced.
[66] M. Pushpalatha,et al. A Graph-Theoretic Algorithm for Detection of Multiple Wormhole Attacks in Mobile Ad Hoc Networks , 2009 .
[67] Saurabh Bagchi,et al. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.
[68] Suresh Sankaranarayanan,et al. Performance of Wireless Body Sensor based Mesh Network for Health Application , 2010 .
[69] Bharat K. Bhargava,et al. E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[70] Chi-Sung Laih,et al. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.
[71] A. L. Sangal,et al. Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model , 2010 .
[72] Nabendu Chaki,et al. A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[73] Vinodhini,et al. Enhancing Key Management In Intrusion Detection System For Manets , 2012 .
[74] Saurabh Upadhyay. Avoiding Wormhole Attack in MANET using Statistical Analysis Approach , 2012 .
[75] T. Arivoli,et al. Improved location-free topology control protocol in MANET , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).
[76] P. Santhi Thilagam,et al. Taxonomy of Network Layer Attacks in Wireless Mesh Network , 2012 .
[77] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[78] Eui-Nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.
[79] Hao Dong,et al. Multi-hop routing optimization method based on improved ant algorithm for vehicle to roadside network , 2014 .
[80] Li Gao,et al. Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks , 2010, 2010 2nd International Conference on Future Computer and Communication.
[81] Najma Farooq,et al. Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks , 2014 .
[82] Ali Modirkhazeni,et al. Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.
[83] Pawan Ahuja,et al. Performance evaluation and comparison of AODV and DSR routing protocols in MANETs under wormhole attack , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).