-
1
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM, 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
4544221255
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
Zapata MG. Secure ad hoc on-demand distance vector (SAODV) routing. In IETF Internet Draft. http://www.ietf.org/internetdrafts/draft-guerrero-manet- saodv-00.txt, 2001.
-
(2001)
IETF Internet Draft
-
-
Zapata, M.G.1
-
5
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
Ács G, Buttyán L, Vajda I. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(11): 1533-1546.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Ács, G.1
Buttyán, L.2
Vajda, I.3
-
9
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodes fairness in dynamic adhoc networks
-
Buchegger S, Le Boudec J-Y. Performance analysis of the confidant protocol: cooperation of nodes fairness in dynamic adhoc networks. In Proceedings of IEEE/ACM MobiHOC, 2002.
-
(2002)
Proceedings of IEEE/ACM MobiHOC
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
10
-
-
25844465866
-
HADOF: Defense against routing disruption in mobile ad hoc networks
-
Yu W, Sun Y, Liu KJR. HADOF: defense against routing disruption in mobile ad hoc networks. In Proceedings of IEEE INFOCOM, 2005.
-
(2005)
Proceedings of IEEE INFOCOM
-
-
Yu, W.1
Sun, Y.2
Liu, K.J.R.3
-
11
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Raymond J-F.Traffic analysis: protocols, attacks, design issues, and open problems. In Anonymity 2000, LNCS 2009, 2001; 10- 29.
-
(2001)
Anonymity 2000, LNCS 2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
12
-
-
0003417978
-
Glomosim: A scalable network simulation environment, v2.03
-
UC Los Angeles, CA, December
-
Bagrodia R, et al. Glomosim: A scalable network simulation environment, v2.03. Parallel Computing Lab, UC Los Angeles, CA, December 2000.
-
(2000)
Parallel Computing Lab
-
-
Bagrodia, R.1
-
13
-
-
3042595360
-
Ad Hoc On Demand Distance Vector (AODV) Routing
-
July, RFC 3561
-
Perkins CE, Belding-Royer EM, Das SR. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF, July 2003. RFC 3561.
-
(2003)
IETF
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
15
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
Back A, Moller U, Stiglic A. Traffic analysis attacks and tradeoffs in anonymity providing systems. In 1H 2001, LNCS 2137, 2001; 245-257.
-
(2001)
1H 2001, LNCS 2137
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
16
-
-
25644450392
-
Perfect simulation and stationarity of a class of mobility models
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
Le Boudec J-Y, Vojnovic M. Perfect simulation and stationarity of a class of mobility models. In Proceedings of IEEE INFOCOM, 2005; 2743-2754. (Pubitemid 41382387)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2743-2754
-
-
Le Boudec, J.-Y.1
Vojnovic, M.2
-
21
-
-
0003428414
-
-
Stevens WR (ed.), Addison-Wesley: Reading, Massachusetts
-
Stevens WR (ed.). TCP/IP Illustrated: The Protocols, Vol. 1. Addison-Wesley: Reading, Massachusetts, 1994.
-
(1994)
TCP/IP Illustrated: The Protocols
, vol.1
-
-
-
24
-
-
68349085165
-
Defense advanced research projects agency. Frequently asked questions v4 for BAA 01-01
-
Washington DC
-
Defense Advanced Research Projects Agency. Frequently asked questions v4 for BAA 01-01, FCS Communication Technology. Washington DC, 2000.
-
(2000)
FCS Communication Technology
-
-
-
25
-
-
4544259841
-
Sector: Secure tracking of node encounters in multiple-hop wireless networks
-
Capkun S, Buttyán L, Hubaux J-P. Sector: secure tracking of node encounters in multiple-hop wireless networks. In Proceedings of SASN, 2003; 21-32.
-
(2003)
Proceedings of SASN
, pp. 21-32
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
28
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal of Wireless Networks (WINET) 2007; 13(1): 27-59.
-
(2007)
ACM Journal of Wireless Networks (WINET)
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
29
-
-
37549006809
-
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
-
Khalil I, Bagchi S, Shroff NB. MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Elsevier Ad Hoc Networks 2008; 6(3): 344-362.
-
(2008)
Elsevier Ad Hoc Networks
, vol.6
, Issue.3
, pp. 344-362
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
31
-
-
39349084494
-
Logical wormhole prevention in optimized link state routing protocol
-
DOI 10.1109/GLOCOM.2007.195, 4411105, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
Attir A, Nait-Abdesselam F, Bensaou B, Ben-Othman J. Logical wormhole prevention in optimized link state routing protocol. In Proceedings of Global Telecommunications Conference (GLOBECOM'07), 2007; 1011-1016. (Pubitemid 351259183)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 1011-1016
-
-
Attir, A.1
Nait-Abdesselam, F.2
Bensaou, B.3
Ben-Othman, J.4
-
33
-
-
33847279913
-
On the survivability of routing protocols in ad hoc wireless networks
-
Awerbuch B, Curtmola R, Holmer D, Rubens H, Nita-Rotaru C. On the survivability of routing protocols in ad hoc wireless networks. In Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
-
(2005)
Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communication Networks
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Rubens, H.4
Nita-Rotaru, C.5
|