-
1
-
-
27544460639
-
Mitigating Byzantine Attacks in Ad Hoc Wireless Networks
-
Technical Report Version 1March, Department of Computer Science, Johns Hopkins University
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "Mitigating Byzantine Attacks in Ad Hoc Wireless Networks", Technical Report Version 1March 2004, Department of Computer Science, Johns Hopkins University.
-
(2004)
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
2
-
-
33847279913
-
On the Survivability of Routing Protocols in Ad HocWireless Networks
-
September
-
B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, C. Nita-Rotaru, "On the Survivability of Routing Protocols in Ad HocWireless Networks", SecureComm 2005 - First International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005.
-
(2005)
SecureComm 2005 - First International Conference on Security and Privacy for Emerging Areas in Communication Networks
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Rubens, H.4
Nita-Rotaru, C.5
-
3
-
-
48049107779
-
-
INRIA, Tech. Rep. ISRN INRIAR/RR-5494, February
-
C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network", INRIA, Tech. Rep. ISRN INRIAR/RR-5494, February 2005.
-
(2005)
Securing the OLSR routing protocol with or without compromised nodes in the network
-
-
Adjih, C.1
Clausen, T.2
Laouiti, A.3
Muhlethaler, P.4
Raffo, D.5
-
4
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
Canary Islands, Spain, January
-
Buchegger, S.; Le Boudec, J.-Y., "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks", Proc. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp. 403-410, Canary Islands, Spain, January 2002.
-
(2002)
Proc. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
5
-
-
14844335451
-
Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks
-
Technical Report IC/2003/31, EPFL-DI-ICA
-
S. Buchegger, J. Le Boudec, "Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks", Technical Report IC/2003/31, EPFL-DI-ICA (2003).
-
(2003)
-
-
Buchegger, S.1
Le Boudec, J.2
-
6
-
-
48049122172
-
-
J. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul, Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR, MILCOM 2007, Orlando, FL, October 2007.
-
J. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul, "Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR", MILCOM 2007, Orlando, FL, October 2007.
-
-
-
-
7
-
-
36349004132
-
Statistical Wormhole Detection in Sensor Networks
-
Hungary, July 13-14
-
L. Buttyán, L. Dóra, and I. Vajda, "Statistical Wormhole Detection in Sensor Networks", Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005) Visegrád, Hungary, July 13-14, 2005.
-
(2005)
Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005) Visegrád
-
-
Buttyán, L.1
Dóra, L.2
Vajda, I.3
-
8
-
-
16244415598
-
Network Tomography: Recent Developments
-
R. Castro, M. Coates, G. Liang, R. Nowak and B.Yu. "Network Tomography: Recent Developments", Statistical Science 2004, Vol. 19, No. 3, 499-517.
-
(2004)
Statistical Science
, vol.19
, Issue.3
, pp. 499-517
-
-
Castro, R.1
Coates, M.2
Liang, G.3
Nowak, R.4
Yu, B.5
-
9
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", Proceedings of IEEE Infocomm 2003.
-
(2003)
Proceedings of IEEE Infocomm
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
10
-
-
35148886678
-
Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis
-
Washington, DC
-
M. Gorlatova, P. Mason, M. Wang, L. Lamont, R. Liscano, "Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis", MILCOM 2006, October 2006, Washington, DC.
-
(2006)
MILCOM 2006, October
-
-
Gorlatova, M.1
Mason, P.2
Wang, M.3
Lamont, L.4
Liscano, R.5
-
12
-
-
34249341133
-
An Intrusion Detection System for Suburban Ad-hoc Networks
-
Nov, Melbourne Australia
-
Islam, M.M. Pose, R. Kopp, C. "An Intrusion Detection System for Suburban Ad-hoc Networks" TENCON 2005 2005 IEEE Region 10, Nov. 2005, Melbourne Australia.
-
(2005)
TENCON 2005 2005 IEEE Region
, vol.10
-
-
Islam, M.M.1
Pose, R.2
Kopp, C.3
-
13
-
-
27544468419
-
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
-
pp
-
I. Khalil, S. Bagchi, N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks", pp. 612-621, 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
-
(2005)
2005 International Conference on Dependable Systems and Networks (DSN'05)
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
14
-
-
50049090997
-
In-Band Wormholes and Countermeasures in OLSR Networks
-
Aug. 28, Baltimore, MD
-
P. Kruus, D. Sterne, R. Gopaul, M. Heyman, B. Rivera, P. Budulas, B. Luu, T. Johnson, N. Ivanic, G. Lawler, "In-Band Wormholes and Countermeasures in OLSR Networks", Second International Conference on Security and Privacy in Communication Networks, (SECURECOMM 2006), Aug. 28, 2006, Baltimore, MD.
-
(2006)
Second International Conference on Security and Privacy in Communication Networks, (SECURECOMM
-
-
Kruus, P.1
Sterne, D.2
Gopaul, R.3
Heyman, M.4
Rivera, B.5
Budulas, P.6
Luu, B.7
Johnson, T.8
Ivanic, N.9
Lawler, G.10
-
15
-
-
84976699318
-
The Byzantine Generals Problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", ACM Trans. Programming Languages and Systems, Vol. 4, No. 3, July 1982, pp. 382-401.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
16
-
-
24944466187
-
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W. Chang, "Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach", IEEE Wireless Communications and Networking Conference (WCNC), 2005.
-
(2005)
IEEE Wireless Communications and Networking Conference (WCNC)
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
17
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, August
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedings of the 6th Intl. Conference on Mobile Computing and Networking. Boston, MA, August 2000.
-
(2000)
Proceedings of the 6th Intl. Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
48649096421
-
-
Optimized Link State Routing (OLSR), IETF RFC 3626, T. Clausen, P. Jacquet, Ed., October 2003.
-
"Optimized Link State Routing (OLSR)", IETF RFC 3626, T. Clausen, P. Jacquet, Ed., October 2003.
-
-
-
-
22
-
-
48649090215
-
-
OLSR.org, http://www.olsr.org.
-
OLSR.org
-
-
-
23
-
-
85117735487
-
A General Cooperative Intrusion Detection Architecture for MANETs
-
College Park, MD, March
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C-Y Tseng, T. Bowen, K. Levitt, J. Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs", Proc. Third IEEE International Information Assurance Workshop, College Park, MD, March 2005.
-
(2005)
Proc. Third IEEE International Information Assurance Workshop
-
-
Sterne, D.1
Balasubramanyam, P.2
Carman, D.3
Wilson, B.4
Talpade, R.5
Ko, C.6
Balupari, R.7
Tseng, C.-Y.8
Bowen, T.9
Levitt, K.10
Rowe, J.11
-
25
-
-
33745940320
-
A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs
-
Alexandria, VA, USA, November 7
-
C. Zouridaki, B.L. Mark, M. Hejmo, and R. K. Thomas, "A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs", Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Held in conjunction with the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 7, 2005.
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Held in conjunction with the 12th ACM Conference on Computer and Communications Security (CCS
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
|