Confirmation of wormhole attack in MANETs using honeypot
暂无分享,去创建一个
[1] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[2] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[3] Nei Kato,et al. A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[4] Asaf Shabtai,et al. Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.
[5] Sheng Zhong,et al. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.
[6] A. Amara Korba,et al. Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[7] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[8] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[9] Tassos Dimitriou,et al. LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks , 2014, J. Comput. Syst. Sci..
[10] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[11] F. Richard Yu,et al. A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.
[12] Muhammad Imran,et al. A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..
[13] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[14] Yuan Zhang,et al. Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN , 2016 .
[15] Paolo Bellavista,et al. Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.
[16] Chu-Hsing Lin,et al. Lifetime elongation of ad hoc networks under flooding attack using power-saving technique , 2014, Ad Hoc Networks.
[17] Zhongcheng Li,et al. TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks , 2014, Ad Hoc Networks.
[18] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[19] Olga Gadyatskaya,et al. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.
[20] Sudhir Bagade,et al. JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET , 2016, ICISS.
[21] Anastasios A. Economides,et al. EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).
[22] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[23] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[24] Magdy S. El-Soudani,et al. A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.
[25] Esmaeil Kheirkhah,et al. Security challenges in mobile ad hoc networks: a survey , 2015, ArXiv.