-
1
-
-
0041973497
-
-
Y. Hu, A. Perrig, and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks., in INFOCOM, 2003.
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks.," in INFOCOM, 2003.
-
-
-
-
3
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. Levine, C Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks," in ICNP, 2002, pp. 78-89.
-
(2002)
ICNP
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
5
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
Kluwer Academic
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad-hoc wireless networks," in Mobile Computing. Kluwer Academic, 1996.
-
(1996)
Mobile Computing
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
85031307530
-
Highly dynamic destination-sequenced distance vector routing (dsdv) for mobile computeres
-
Sep
-
C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance vector routing (dsdv) for mobile computeres," in Proc. ACM SIGCOMM, Sep. 1994.
-
(1994)
Proc. ACM SIGCOMM
-
-
Perkins, C.E.1
Bhagwat, P.2
-
7
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in WiSE '02, 2002.
-
(2002)
WiSE '02
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
9
-
-
27544468419
-
Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks
-
Issa Khalil, Saurabh Bagchi, and Ness B. Shroff, "Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks.," in DSN, 2005, pp. 612-621.
-
(2005)
DSN
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
10
-
-
84968616624
-
Optimized link state routing protocol for ad hoc networks
-
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, "Optimized link state routing protocol for ad hoc networks," in IEEE INMIC, 2001.
-
(2001)
IEEE INMIC
-
-
Jacquet, P.1
Muhlethaler, P.2
Clausen, T.3
Laouiti, A.4
Qayyum, A.5
Viennot, L.6
-
11
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, and D Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in ACM MobiCom, 2002.
-
(2002)
ACM MobiCom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
12
-
-
84961572484
-
Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks
-
Y. Hu, D. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks," in WMCSA '02, 2002.
-
(2002)
WMCSA '02
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
14
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, "Denial of service resilience in ad hoc networks," in MOBICOM, 2004.
-
(2004)
MOBICOM
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
17
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
Lingxuan Hu and David Evans, "Using directional antennas to prevent wormhole attacks.," in NDSS, 2004.
-
(2004)
NDSS
-
-
Hu, L.1
Evans, D.2
-
18
-
-
34548347881
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Radha Poovendran and Loukas Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," ACM Journal on Wireless Networks (WINET), 2005.
-
(2005)
ACM Journal on Wireless Networks (WINET)
-
-
Poovendran, R.1
Lazos, L.2
-
20
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
New York, NY, USA, ACM Press
-
Panagiotis Papadimitratos and Zygmunt J. Haas, "Secure data transmission in mobile ad hoc networks," in WiSe '03, New York, NY, USA, 2003, pp. 41-50, ACM Press.
-
(2003)
WiSe '03
, pp. 41-50
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
21
-
-
33847279913
-
On the survivability of routing protocols in ad hoc wireless networks
-
B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, and C. Nita-Rotaru, "On the survivability of routing protocols in ad hoc wireless networks," in SecureComm, 2005.
-
(2005)
SecureComm
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Rubens, H.4
Nita-Rotaru, C.5
-
22
-
-
46149112252
-
-
Private correspondence
-
Mart Molle, "Private correspondence," 2005.
-
(2005)
-
-
Molle, M.1
|