-
1
-
-
70349101351
-
Detecting wormhole attacks in wireless sensor networks
-
Technical Report, Computer Science and Engineering School, UNSW, The Network Research Laboratory
-
H. Alzaid, S. Abanmi, S. Kanhere, and C. T. Chou. Detecting wormhole attacks in wireless sensor networks. Technical Report, Computer Science and Engineering School - UNSW, The Network Research Laboratory, 2006.
-
(2006)
-
-
Alzaid, H.1
Abanmi, S.2
Kanhere, S.3
Chou, C.T.4
-
2
-
-
33745736659
-
Statistical wormhole detection in sensor networks
-
R. Molva, G. Tsudik, and D. Westhoff, editors, ESAS, of, Springer
-
L. Buttyán, L. Dóra, and I. Vajda. Statistical wormhole detection in sensor networks. In R. Molva, G. Tsudik, and D. Westhoff, editors, ESAS, volume 3813 of Lecture Notes in Computer Science, pages 128-141. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3813
, pp. 128-141
-
-
Buttyán, L.1
Dóra, L.2
Vajda, I.3
-
3
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
J. Eriksson, S. V. Krishnamurthya, and M. Faloutsos. Truelink: A practical countermeasure to the wormhole attack in wireless networks. In ICNP'06, 2006.
-
(2006)
ICNP'06
-
-
Eriksson, J.1
Krishnamurthya, S.V.2
Faloutsos, M.3
-
5
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
84895207016
-
Tinyos: An operating system for sensor networks
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler. Tinyos: An operating system for sensor networks. In Ambient Intelligence. 2005.
-
(2005)
Ambient Intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
Culler, D.11
-
9
-
-
42649100347
-
Detecting and avoiding wormhole attacks in wireless ad hoc networks
-
April
-
F. Nait-Abdesselam, B. Bensaou, and T. Taleb. Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 46(4), April 2008.
-
(2008)
Communications Magazine, IEEE
, vol.46
, Issue.4
-
-
Nait-Abdesselam, F.1
Bensaou, B.2
Taleb, T.3
-
10
-
-
33144467802
-
-
P. Papadimitratos and Z. Haas. Secure Data Communication in Mobile Ad Hoc Networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, 24(2):343-356, 2006.
-
P. Papadimitratos and Z. Haas. Secure Data Communication in Mobile Ad Hoc Networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, 24(2):343-356, 2006.
-
-
-
-
11
-
-
33845916834
-
A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks
-
R. Poovendran and L. Lazos. A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks. ACM/Kluwer Wireless Networks, 13(1), 2005.
-
(2005)
ACM/Kluwer Wireless Networks
, vol.13
, Issue.1
-
-
Poovendran, R.1
Lazos, L.2
-
12
-
-
58049188696
-
Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility
-
M. Poturalski, P. Papadimitratos, and J.-P. Hubaux. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility. In ACM ASIACCS 2008.
-
ACM ASIACCS 2008
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
15
-
-
70349156883
-
A Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks
-
Technical report, EPFL LCA-REPORT-2008-020
-
R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux. A Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks. Technical report, EPFL LCA-REPORT-2008-020, 2008.
-
(2008)
-
-
Shokri, R.1
Poturalski, M.2
Ravot, G.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
16
-
-
70349085860
-
-
A. Srinivasan and J. Wu. A Survey on Secure Localization in Wireless Sensor Networks. Encyclopedia of Wireless and Mobile Communications, 2008.
-
A. Srinivasan and J. Wu. A Survey on Secure Localization in Wireless Sensor Networks. Encyclopedia of Wireless and Mobile Communications, 2008.
-
-
-
-
18
-
-
11244309139
-
Visualization of wormholes in sensor networks
-
W. Wang and B. Bhargava. Visualization of wormholes in sensor networks. In ACM WiSe, 2004.
-
(2004)
ACM WiSe
-
-
Wang, W.1
Bhargava, B.2
-
19
-
-
33744927512
-
Sensor field localization: A deployment and empirical analysis
-
Technical Report UCB//CSD-04-1349, Univ. of California, Berkeley
-
K. Whitehouse, F. Jiang, A. Woo, C. Karlof, and D. Culler. Sensor field localization: a deployment and empirical analysis. Technical Report UCB//CSD-04-1349, Univ. of California, Berkeley, 2004.
-
(2004)
-
-
Whitehouse, K.1
Jiang, F.2
Woo, A.3
Karlof, C.4
Culler, D.5
-
20
-
-
33746895103
-
Models and solutions for radio irregularity in wireless sensor networks
-
G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic. Models and solutions for radio irregularity in wireless sensor networks. ACM Transaction on Sensor Networks, 2(2):221-262, 2006.
-
(2006)
ACM Transaction on Sensor Networks
, vol.2
, Issue.2
, pp. 221-262
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
-
21
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA, ACM
-
S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62-72, New York, NY, USA, 2003. ACM.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|