-
1
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, January
-
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 2002, pp. 131-144.
-
(2002)
Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference
, pp. 131-144
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
2
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," in IEEE Wireless Communications, vol. 11, no. 1, 2004. pp. 48-60.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
3
-
-
33744988557
-
Mobile ad hoc network security - a taxonomy
-
ICACT, February
-
S. Alampalayam, A. Kumar, and S. Shrinivasan, "Mobile ad hoc network security - a taxonomy," in The 7th International Conference on Advanced Communication Technology, vol. 2. ICACT, February 2005, pp. 839844.
-
(2005)
The 7th International Conference on Advanced Communication Technology
, vol.2
, pp. 839844
-
-
Alampalayam, S.1
Kumar, A.2
Shrinivasan, S.3
-
4
-
-
35148865932
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Rice University Dept. of Computer Science, Technical Report TR01-384
-
D. B. J. Yih-Chun Hu, Adrian Perrig, "Packet leashes: A defense against wormhole attacks in wireless networks," Rice University Dept. of Computer Science, Technical Report TR01-384, 2001.
-
(2001)
-
-
Yih-Chun Hu, D.B.J.1
Perrig, A.2
-
5
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
Dept. of Computer Science, University of Massachusetts, Ahmerst, Technical Report Tech Report 02-32
-
B. Dahill, B. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," Dept. of Computer Science, University of Massachusetts, Ahmerst, Technical Report Tech Report 02-32, 2001.
-
(2001)
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
6
-
-
35148814682
-
-
W. Wang and B. Bhargava, Visualization of wormholes in sensor networks, in Proceedings of the 2004 ACM workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 5160.
-
W. Wang and B. Bhargava, "Visualization of wormholes in sensor networks," in Proceedings of the 2004 ACM workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 5160.
-
-
-
-
7
-
-
35148851762
-
-
N. W. Group, Optimized link state routing protocol, IETF. Tech. Rep. RFC 3626, 2003.
-
N. W. Group, "Optimized link state routing protocol," IETF. Tech. Rep. RFC 3626, 2003.
-
-
-
-
9
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
Fairfax, Virginia
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Sector: secure tracking of node encounters in multi-hop wireless networks," in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, Virginia, 2003, pp. 21-32.
-
(2003)
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
11
-
-
11244264140
-
-
L. Lazos and R. Poovendran, Serloc: Secure range-independent localization for wireless sensor networks, in Proceedings of the ACM Workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 21-30.
-
L. Lazos and R. Poovendran, "Serloc: Secure range-independent localization for wireless sensor networks," in Proceedings of the ACM Workshop on Wireless Security. Philadelphia, PA, U.S.A: WiSe'04, October 2004, pp. 21-30.
-
-
-
-
12
-
-
2942696111
-
Ad hoc network security with geographical aids
-
Taipei, Taiwan: ICNSC IEEE, March
-
S.-T. Li and X. Wang, "Ad hoc network security with geographical aids," in Proceedings of the 2004 IEEE Annual Conference on Networking, Sensing and Control. Taipei, Taiwan: ICNSC IEEE, March 2004.
-
(2004)
Proceedings of the 2004 IEEE Annual Conference on Networking, Sensing and Control
-
-
Li, S.-T.1
Wang, X.2
-
13
-
-
24744448664
-
Verifying physical presence of neighbors against replaybased attacks in wireless ad hoc networks
-
T. Korkmaz, "Verifying physical presence of neighbors against replaybased attacks in wireless ad hoc networks," in International Conference on Information Technology: Coding and Computing, vol. 2, 2005, pp. 704-709.
-
(2005)
International Conference on Information Technology: Coding and Computing
, vol.2
, pp. 704-709
-
-
Korkmaz, T.1
-
14
-
-
33744502133
-
Secure olsr
-
Tamkang University, Taiwan: AINA'05, March
-
F. Hong, L. Hong, and C. Fu, "Secure olsr," in 19th International Conference on Advanced Information Networking and Applications, vol. 1. Tamkang University, Taiwan: AINA'05, March 2005, pp. 713718.
-
(2005)
19th International Conference on Advanced Information Networking and Applications
, vol.1
, pp. 713718
-
-
Hong, F.1
Hong, L.2
Fu, C.3
-
15
-
-
33144475784
-
Wormhole attacks in wireless networks
-
February
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
17144399950
-
Secure node misbehaviors in mobile ad hoc networks
-
Los Angeles, CA, U.S.A: IEEE, September
-
C. Chigan and R. Bandaru, "Secure node misbehaviors in mobile ad hoc networks," in Vehicular Technology Conference, vol. 7. Los Angeles, CA, U.S.A: IEEE, September 2004, pp. 4730-4734.
-
(2004)
Vehicular Technology Conference
, vol.7
, pp. 4730-4734
-
-
Chigan, C.1
Bandaru, R.2
-
17
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
IEEE, February
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: Challenges and solutions," in IEEE Wireless Communications, vol. 7. IEEE, February 2004.
-
(2004)
IEEE Wireless Communications
, vol.7
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
18
-
-
27544468419
-
Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks
-
Yokohama, Japan: DSN'05, June
-
I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks," in Proceedings of the 2005 International Conference on Dependable Systems and Networks. Yokohama, Japan: DSN'05, June 2005, pp. 612-621.
-
(2005)
Proceedings of the 2005 International Conference on Dependable Systems and Networks
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
20
-
-
33847279913
-
-
B. Awerbuch, R. Curtmola, D. Holmer, herbert Rubens, and C. NitaRotaru, On the survivability of routing protocols in ad hoc wireless networks, in Conference on Security and Privacy for Emerging Areas in Communications. Athens, Greece: SecureComm 2005, September 2005.
-
B. Awerbuch, R. Curtmola, D. Holmer, herbert Rubens, and C. NitaRotaru, "On the survivability of routing protocols in ad hoc wireless networks," in Conference on Security and Privacy for Emerging Areas in Communications. Athens, Greece: SecureComm 2005, September 2005.
-
-
-
-
21
-
-
35148877522
-
-
L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, in Proceedings of the 11th Network and Distributed System Security Symposium. San Diego, California: NDSS 04, February 2004, pp. 131-141.
-
L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proceedings of the 11th Network and Distributed System Security Symposium. San Diego, California: NDSS 04, February 2004, pp. 131-141.
-
-
-
-
22
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. Chang, "Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach," in IEEE Communication Society. WCNC 2005, 2005.
-
IEEE Communication Society
, vol.WCNC 2005
, pp. 2005
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.5
-
23
-
-
0142187757
-
Preventing replay attacks for secure routing in ad hoc networks
-
Montreal, Canada: ADHOCNOW, October
-
J. Zhen and S. Srinivas, "Preventing replay attacks for secure routing in ad hoc networks," in ADHOC-NOW 2003. Montreal, Canada: ADHOCNOW, October 2003, pp. 140-150.
-
(2003)
ADHOC-NOW 2003
, pp. 140-150
-
-
Zhen, J.1
Srinivas, S.2
-
24
-
-
35148835933
-
An effective intrusion detection approach for the optimized link state routing (olsr) mobile ad hoc networking protocol
-
Boston, Massachusetts, USA, November
-
M. Wang, L. Lamont, M. Gorlatova, and P. Mason, "An effective intrusion detection approach for the optimized link state routing (olsr) mobile ad hoc networking protocol," in Proceedings of the First Workshop on Secure Network Protocols (NPSec), Boston, Massachusetts, USA, November 2005.
-
(2005)
Proceedings of the First Workshop on Secure Network Protocols (NPSec)
-
-
Wang, M.1
Lamont, L.2
Gorlatova, M.3
Mason, P.4
-
25
-
-
33847409541
-
The nrl mobile network emulator
-
Monterey, CA, U.S.A, October
-
J. W. W. Chao, Joe Macker, "The nrl mobile network emulator." in IEEE MILCOM, Monterey, CA, U.S.A, October 2003, pp. 131-144.
-
(2003)
IEEE MILCOM
, pp. 131-144
-
-
Chao, J.W.W.1
Macker, J.2
-
26
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
September
-
Y. Zhang, W. Lee, and Y Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, pp. 545-546, September 2003.
-
(2003)
Wireless Networks
, vol.9
, pp. 545-546
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|