-
1
-
-
84904904836
-
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002, pp. 78-87.
-
-
-
-
2
-
-
84961572484
-
-
Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002, pp. 3-13.
-
-
-
-
3
-
-
85177175581
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: ACM MobiCom'02, 2002, pp. 12-23.
-
-
-
-
4
-
-
37549004191
-
-
P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002).
-
-
-
-
5
-
-
37549019099
-
-
C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: ACM MobiCom'00, 2000, pp. 65-67.
-
-
-
-
6
-
-
0035789268
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
Ganesan D., Govindan R., Shenker S., and Estrin D. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review 4 5 (2001) 11-25
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.4
, Issue.5
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
7
-
-
84904578657
-
-
F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: 10th International Conference on Computer Communications and Networks (ICCCN), 2001, pp. 304-309.
-
-
-
-
8
-
-
0036986248
-
-
D. Braginsky, D. Estrin, Rumor routing algorithm for sensor networks, in: 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), 2002 pp. 22-31.
-
-
-
-
9
-
-
85031307530
-
-
C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in: ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, 1994, pp. 234-244.
-
-
-
-
10
-
-
37549040388
-
-
C. Karlof, Y. Li, J. Polastre, ARRIVE: Algorithm for Robust Routing in Volatile Environments, Technical Report UCB/CSD-03-1233, March 2003.
-
-
-
-
11
-
-
84942426861
-
-
C. Karlof, D. Wagner, Secure routing in sensor networks: attacks and countermeasures, in: 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
-
-
-
-
12
-
-
85177501245
-
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MobiCom'00, 2000, pp. 255-265.
-
-
-
-
13
-
-
0041973497
-
-
Y.C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: IEEE INFOCOM, 2003, pp. 1976-1986.
-
-
-
-
14
-
-
37549067536
-
-
L. Hu, D. Evans, Using directional antennas to prevent wormhole attacks, in: Network and Distributed System Security Symposium, 2004, pp. 131-141.
-
-
-
-
15
-
-
27544468419
-
-
I. Khalil, S. Bagchi, N.B. Shroff, LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: International Conference on Dependable Systems and Networks (DSN), 2005, pp. 612-621.
-
-
-
-
16
-
-
1542317831
-
-
Y.C. Hu, A. Perrig, D. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: ACM Workshop on Wireless Security (WiSe'03), 2003, pp. 30-40.
-
-
-
-
17
-
-
37549006577
-
-
A. Qayyum, L. Viennot, A. Laouiti, Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks, Technical Report Research Report RR-3898, project HIPEERCOM, INRIA, February 2000.
-
-
-
-
18
-
-
0032669825
-
-
B. Bellur, R.G. Ogier, A reliable, efficient topology broadcast for dynamic networks, in: IEEE INFOCOM'99, 1999, pp. 178-186.
-
-
-
-
19
-
-
37549071249
-
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, Mitigating Byzantine Attacks in Ad Hoc Wireless Networks, Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, March 2004.
-
-
-
-
20
-
-
4544259841
-
-
S. Capkun, L. Buttyán, J.-P. Hubaux, SECTOR: secure tracking of node encounters in multi-hop wireless networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 03), 2003, pp.21-32.
-
-
-
-
21
-
-
0242696192
-
-
S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol, in: ACM MobiHoc, 2002, pp. 226-236.
-
-
-
-
22
-
-
37549054248
-
-
Ralph C. Merkle, Protocols for public key cryptosystems, in: Proceedings of the IEEE Symposium on Security and Privacy, 1980.
-
-
-
-
23
-
-
37549069105
-
-
The Network Simulator - ns-2. .
-
-
-
-
24
-
-
0035425905
-
-
A. Nasipuri, R. Castaneda, S.R. Das, Performance of multipath routing for on-demand protocols in mobile ad hoc networks, in: ACM Mobile Networks and Applications (MONET), 2001, pp. 339-349.
-
-
-
-
25
-
-
37549021667
-
-
A.A. Pirzada, C. McDonald, Establishing trust in pure ad hoc networks, in: Proceedings of 27th Australasian Computer Science Conference (ACSC'04), 2004, pp. 47-54.
-
-
-
-
26
-
-
4544258840
-
-
Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), 2003, pp. 135-147.
-
-
-
-
27
-
-
37549039250
-
-
J. Hightower, G. Borriello, Location sensing techniques, Technical Report of the University of Washington CS Department, UW-CSE-01-07-01, July 2001.
-
-
-
-
28
-
-
85084163355
-
-
C. Savarese, J. Rabaey, K. Langendoen, Robust positioning algorithms for distributed ad hoc wireless sensor networks, in: USENIX Technical Annual Conference, 2002.
-
-
-
-
29
-
-
0034548432
-
-
J. Li, J. Jannotti, D.S.J. De Couto, D.R. Karger, R. Morris, A scalable location service for geographic ad hoc routing, in: ACM MobiCom, 2000, pp. 120-130.
-
-
-
-
30
-
-
15344343328
-
-
J.-H. Song, V. Wong, V. Leung, Network protocols: a framework of secure location service for position-based ad hoc routing, in: Proceedings of the 1st ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004, pp. 99-106.
-
-
-
-
31
-
-
11244309139
-
-
W. Wang, B. Bhargava, Visualization of wormholes in sensor networks, in: Proceedings of the ACM workshop on Wireless security (Wise'04), 2004, pp. 51-60.
-
-
-
-
32
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
-
Lazos L., Poovendran R., Meadows C., Syverson P., and Chang L.W. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. IEEE Wireless Communications and Networking Conference (WCNC05) 2 13-17 (2005) 1193-1199
-
(2005)
IEEE Wireless Communications and Networking Conference (WCNC05)
, vol.2
, Issue.13-17
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
33
-
-
11244273945
-
-
L. Hu, D. Evans, Localization for mobile sensor networks, in: ACM MobiCom'04, 2004, pp. 45-57.
-
-
-
-
34
-
-
27944459744
-
-
D. Liu, P. Ning, W. Du, Detecting malicious beacon nodes for secure location discovery in wireless sensor networks, in: 25th International Conference on Distributed Computer Systems (ICDCS'05), 2005, pp. 609-619.
-
-
-
-
38
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002, pp. 41-47.
-
-
-
-
41
-
-
1542317849
-
-
N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security (WiSe'03), 2003, pp. 1-10.
-
-
-
-
42
-
-
3042785862
-
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in Sensor Networks: Analysis & Defenses, IPSN'04, 2004, pp. 259-268.
-
-
-
-
43
-
-
37549059363
-
-
Q. Zhang, P. Wang, D.S. Reeves, P. Ning, Defending against Sybil attacks in sensor networks, in: SDCS'05, 2005, pp. 185-191.
-
-
-
-
44
-
-
37549049963
-
-
G. Khanna, S. Bagchi, Y.-S. Wu, Fault tolerant energy aware data dissemination protocol in sensor network, in: IEEE DSN'04, 2004, pp. 739-748.
-
-
-
-
45
-
-
0031357724
-
-
J.H. Kim, J.K. Lee, Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading, in: IEEE Global Telecommunications Conference (GLOBECOM), vol. 1, 1997, pp. 404-408.
-
-
-
|