-
1
-
-
70350341717
-
-
Wireless/Mobile Network Security: Springer, Ch7, pp
-
T. Anantvalee, J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks", Wireless/Mobile Network Security: Springer 2006, Ch7, pp. 170-196.
-
(2006)
A Survey on Intrusion Detection in Mobile Ad Hoc Networks
, pp. 170-196
-
-
Anantvalee, T.1
Wu, J.2
-
2
-
-
0004024262
-
The Ad hoc On-Demand Distance Vector Protocol
-
C. E. Perkins, editor, Addison-Wesley
-
C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley, 2000, pp. 173-219.
-
(2000)
Ad hoc Networking
, pp. 173-219
-
-
Perkins, C.E.1
Royer, E.M.2
-
4
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
INFOCOM, pp
-
Y. C. Hu, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks", in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976-1986, 2003.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
27544468419
-
-
I. Khalil, S. Bagchi, N. B. Shroff, LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, dsn, pp. 612-621, 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
-
I. Khalil, S. Bagchi, N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks", dsn, pp. 612-621, 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
-
-
-
-
7
-
-
4544259841
-
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
-
Washington,USA, Oct
-
S. Capkun, L. Buttyan, and J. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks", ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 1-12, Washington,USA, Oct 2003.
-
(2003)
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 1-12
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
8
-
-
49049093113
-
-
W. Ribeiro, P. Junior, T. Figueiredo, H. Wong, and A. Loureiro. Malicious Node Detection in Wireless Sensor Networks, ipdps, p. 24b, 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Papers, 2004.
-
W. Ribeiro, P. Junior, T. Figueiredo, H. Wong, and A. Loureiro. "Malicious Node Detection in Wireless Sensor Networks", ipdps, p. 24b, 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Papers, 2004.
-
-
-
-
9
-
-
34247527847
-
-
X. Wang, Intrusion Detection Techniques in Wireless Ad Hoc Networks, compsac, pp. 347-349, 30th Annual International Computer Software and Applications Conference COMPSAC'06, 2006
-
X. Wang, "Intrusion Detection Techniques in Wireless Ad Hoc Networks", compsac, pp. 347-349, 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006.
-
-
-
-
10
-
-
37349001578
-
-
X. Wang, and J. Wong, An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks, compsac, pp. 39-48, 31st Annual International Computer Software and Applications Conference, 1-COMPSAC 2007, 2007
-
X. Wang, and J. Wong, "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks," compsac, pp. 39-48, 31st Annual International Computer Software and Applications Conference - Vol. 1-(COMPSAC 2007), 2007.
-
-
-
-
11
-
-
24944483778
-
Securing sensor networks with location-based keys
-
March
-
Y. Zhang, W. Liu, W. Lou and Y. Fang "Securing sensor networks with location-based keys", WCNC 2005 - IEEE Wireless Communications and Networking Conference, no. 1, March 2005, pp. 1909-1914.
-
(2005)
WCNC 2005 - IEEE Wireless Communications and Networking Conference
, vol.1
, pp. 1909-1914
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
12
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
ISSN:1022-0038, pp
-
R. Poovendran, L., Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks", in Wireless Networks, Volume 13, Issue 1, ISSN:1022-0038, pp. 27-59, 2007.
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
13
-
-
33746301431
-
-
N. Song, L. Qian, and X. Li. Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach, ipdps, p. 289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17, 2005.
-
N. Song, L. Qian, and X. Li. "Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach", ipdps, p. 289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17, 2005.
-
-
-
-
16
-
-
49049110583
-
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection
-
M. Azer, S. El-Kassas,and M. El-Soudani, "Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection,", SECRYPT 2006, pp. 63-68.
-
(2006)
SECRYPT
, pp. 63-68
-
-
Azer, M.1
El-Kassas, S.2
El-Soudani, M.3
-
17
-
-
33745657261
-
A Specification-Based Intrusion Detection Model for OLSR
-
C. Tseng, T. Song, P. Balasubramanyam, C. Ko, K. Levitt, "A Specification-Based Intrusion Detection Model for OLSR", RAID 2005, pp. 330-350.
-
(2005)
RAID
, pp. 330-350
-
-
Tseng, C.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.5
-
18
-
-
33646906812
-
Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks
-
April
-
T. Forde, L. Doyle, and D. O'Mahony, "Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks", IEEE Communications Magazine, vol. 44, no. 4, April 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
-
-
Forde, T.1
Doyle, L.2
O'Mahony, D.3
|