-
3
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad-hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad-hoc networks," in ACM MobiCom'02, pp. 12-23, 2002.
-
(2002)
ACM MobiCom'02
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in ACM MobiCom'00), pp. 65-67, 2000.
-
(2000)
ACM MobiCom'00)
, pp. 65-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
6
-
-
0035789268
-
Highly- resilient, energy-efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly- resilient, energy-efficient multipath routing in wireless sensor networks," in ACM SIGMOBILE Mobile Computing and Communications Review, vol. 4, no. 5, pp. 11-25, 2001.
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.4
, Issue.5
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad-hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad-hoc networks," in ACM MobiCom'00, pp. 255-265, 2000.
-
(2000)
ACM MobiCom'00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. C. Hu, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in IEEE INFOCOM, pp. 1976-1986, 2003.
-
(2003)
IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
27544468419
-
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
-
I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," in the International Conference on Dependable Systems and Networks (DSN), pp. 612-621, 2005.
-
(2005)
International Conference on Dependable Systems and Networks (DSN)
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
16
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad-hoc Network Routing Protocols
-
Y. C. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad-hoc Network Routing Protocols," in ACM Workshop on Wireless Security (WiSe'03), pp. 30-40, 2003.
-
(2003)
ACM Workshop on Wireless Security (WiSe'03)
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
17
-
-
0003491910
-
Multipoint Relaying: An Efficent Technique for Flooding in Mobile Wireless Networks,
-
RR-3898, project HIPEERCOM, INRIA, February
-
A. Qayyum, L. Viennot, and A. Laouiti, "Multipoint Relaying: An Efficent Technique for Flooding in Mobile Wireless Networks," Technical Report Research Report RR-3898, project HIPEERCOM, INRIA, February 2000.
-
(2000)
Technical Report Research Report
-
-
Qayyum, A.1
Viennot, L.2
Laouiti, A.3
-
18
-
-
0032669825
-
A Reliable, Efficient Topology Broadcast for Dynamic Networks
-
B. Bellur and R. G. Ogier, "A Reliable, Efficient Topology Broadcast for Dynamic Networks," in IEEE INFOCOM'99, pp. 178-186, 1999.
-
(1999)
IEEE INFOCOM'99
, pp. 178-186
-
-
Bellur, B.1
Ogier, R.G.2
-
19
-
-
27544460639
-
-
Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, March
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H Rubens, "Mitigating Byzantine Attacks in Ad-hoc Wireless Networks," Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, March 2004.
-
(2004)
Mitigating Byzantine Attacks in Ad-hoc Wireless Networks
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
21
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in ACM MobiHoc, pp. 226-236, 2002.
-
(2002)
ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
24
-
-
0035425905
-
Performance of Multipath Routing for On-demand protocols in Mobile Ad-hoc Networks
-
A. Nasipuri, R. Castaneda, and S.R. Das, "Performance of Multipath Routing for On-demand protocols in Mobile Ad-hoc Networks," in ACM Mobile Networks and Applications (MONET), pp. 339-349, 2001.
-
(2001)
ACM Mobile Networks and Applications (MONET)
, pp. 339-349
-
-
Nasipuri, A.1
Castaneda, R.2
Das, S.R.3
-
29
-
-
0034548432
-
A scalable location service for geographic ad-hoc routing
-
J. Li, J. Jannotti, D.S.J. De Couto, D.R. Karger, and R. Morris, "A scalable location service for geographic ad-hoc routing," in ACM MobiCom, pp. 120-130, 2000.
-
(2000)
ACM MobiCom
, pp. 120-130
-
-
Li, J.1
Jannotti, J.2
De Couto, D.S.J.3
Karger, D.R.4
Morris, R.5
-
30
-
-
15344343328
-
Network protocols: A framework of secure location service for position-based ad-hoc routing
-
st ACM international workshop on Performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks, pp. 99-106, 2004.
-
(2004)
st ACM international workshop on Performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks
, pp. 99-106
-
-
Song, J.-H.1
Wong, V.2
Leung, V.3
-
32
-
-
24944466187
-
Preventing wormhole attacks on wireless ad-hoc networks: A graph theoretic approach
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, "Preventing wormhole attacks on wireless ad-hoc networks: a graph theoretic approach," in the IEEE Wireless Communications and Networking Conference (WCNC05), Volume 2, 13-17, pp. 1193-1199, 2005.
-
(2005)
IEEE Wireless Communications and Networking Conference (WCNC05)
, vol.2
, Issue.13-17
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
33
-
-
11244273945
-
Localization for Mobile Sensor Networks
-
L. Hu and D. Evans, "Localization for Mobile Sensor Networks," in ACM MobiCom'04, pp. 45-57, 2004.
-
(2004)
ACM MobiCom'04
, pp. 45-57
-
-
Hu, L.1
Evans, D.2
-
35
-
-
0003574092
-
-
Fourth Edition, Springer-Verlag
-
B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, "Global Positioning System: Theory and Practice," in the Fourth Edition, Springer-Verlag, 1997.
-
(1997)
Global Positioning System: Theory and Practice
-
-
Hofmann-Wellenhof, B.1
Lichtenegger, H.2
Collins, J.3
-
36
-
-
84866469313
-
-
L. Lazos and R. Poovendran, SeRLoc: Robust Localization for Wireless Sensor Networks, in ACM Transactions on Sensor Networks (TOSN), 1, Issue 1, pp. 73-100, 2005.
-
L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Volume 1, Issue 1, pp. 73-100, 2005.
-
-
-
-
37
-
-
27644548026
-
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
-
K. Sun, P. Ning, and C. Wang, "Fault-tolerant cluster-wise clock synchronization for wireless sensor networks," in the IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 2, Issue 3, pp.177-189, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.2
, Issue.3
, pp. 177-189
-
-
Sun, K.1
Ning, P.2
Wang, C.3
-
41
-
-
1542317849
-
Secure verification of location claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in ACM Workshop on Wireless Security (WiSe'03), pp. 1-10, 2003.
-
(2003)
ACM Workshop on Wireless Security (WiSe'03)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
42
-
-
3042785862
-
The Sybil attack in Sensor Networks: Analysis & Defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in Sensor Networks: Analysis & Defenses," IPSN'04, pp. 259-268, 2004.
-
(2004)
IPSN'04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
43
-
-
85116427082
-
Defending against Sybil Attacks in Sensor Networks
-
Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending against Sybil Attacks in Sensor Networks," in SDCS'05, pp. 185-191, 2005.
-
(2005)
SDCS'05
, pp. 185-191
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
-
44
-
-
27544479643
-
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Network
-
G. Khanna, S. Bagchi, and Y.-S. Wu, "Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Network," in IEEE DSN'04, pp. 739-748, 2004.
-
(2004)
IEEE DSN'04
, pp. 739-748
-
-
Khanna, G.1
Bagchi, S.2
Wu, Y.-S.3
-
45
-
-
0031357724
-
Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading
-
J. H. Kim and J. K. Lee, "Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading," im IEEE Global Telecommunications Conference (GLOBECOM), Vol. 1, pp. 404-408, 1997.
-
(1997)
im IEEE Global Telecommunications Conference (GLOBECOM)
, vol.1
, pp. 404-408
-
-
Kim, J.H.1
Lee, J.K.2
-
46
-
-
0036219438
-
Analysis of wireless CSMA/CA network using single station superposition (SSS)
-
T. Khattab, M. El-Hadidi, and H. Mourad, "Analysis of wireless CSMA/CA network using single station superposition (SSS)," International Journal of Electronics and Communications (AE), vol. 56, 2002.
-
(2002)
International Journal of Electronics and Communications (AE)
, vol.56
-
-
Khattab, T.1
El-Hadidi, M.2
Mourad, H.3
|