-
1
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. of IEEE INFOCOM, 2003.
-
(2003)
Proc. of IEEE INFOCOM
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. of IEEE ICNP, 2002.
-
(2002)
Proc. of IEEE ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
4
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. of NDSS, 2004.
-
(2004)
Proc. of NDSS
-
-
Hu, L.1
Evans, D.2
-
7
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information," in Proc. of IEEE INFOCOM, 2007.
-
(2007)
Proc. of IEEE INFOCOM
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
8
-
-
47349107481
-
Distributed detection of worm-holes and critical links in wireless sensor networks
-
Y.-T. Hou, C.-M. Chen, and B. Jeng, "Distributed detection of worm-holes and critical links in wireless sensor networks," in Proc. of IIHMSP, 2007.
-
(2007)
Proc. of IIHMSP
-
-
Hou, Y.-T.1
Chen, C.-M.2
Jeng, B.3
-
9
-
-
84969674668
-
Swat: A decentralized self-healing mechanism for wormhole attacks in wireless sensor networks
-
Y. Xiao, H. Chen and F. Li eds
-
C. Lee and J. Suzuki, "Swat: A decentralized self-healing mechanism for wormhole attacks in wireless sensor networks," In Y. Xiao, H. Chen and F. Li (eds.) Handbook on Sensor Networks, Chapter 24, World Scientific Publishing, ISBN: 978-981-283-730-1, 2010.
-
Handbook on Sensor Networks, Chapter 24, World Scientific Publishing, ISBN: 978-981-283-730-1
, pp. 2010
-
-
Lee, C.1
Suzuki, J.2
-
10
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," in Proc. of IEEE ICNP, 2006.
-
(2006)
Proc. of IEEE ICNP
-
-
Eriksson, J.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
11
-
-
33745403778
-
Defending against wormhole attacks in mobile ad hoc networks: Research articles
-
W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wirel. Commun. Mob. Comput., vol. 6, no. 4, pp. 483-503, 2006.
-
(2006)
Wirel. Commun. Mob. Comput
, vol.6
, Issue.4
, pp. 483-503
-
-
Wang, W.1
Bhargava, B.2
Lu, Y.3
Wu, X.4
-
12
-
-
38549151872
-
On mitigating in-band wormhole attacks in mobile ad hoc networks
-
X. Su and R. V. Boppana, "On mitigating in-band wormhole attacks in mobile ad hoc networks," in Proc. of IEEE ICC, 2007.
-
(2007)
Proc. of IEEE
, vol.199
-
-
Su, X.1
Boppana, R.V.2
-
13
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Wormhole attacks in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
14
-
-
34447283779
-
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
-
I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 51, no. 13, pp. 3750-3772, 2007.
-
(2007)
Comput. Netw
, vol.51
, Issue.13
, pp. 3750-3772
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
15
-
-
37549006809
-
Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks
-
-, "Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Netw., vol. 6, no. 3, pp. 344-362, 2008.
-
(2008)
Ad Hoc Netw
, vol.6
, Issue.3
, pp. 344-362
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
17
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wirel. Netw., vol. 13, no. 1, pp. 27-59, 2007.
-
(2007)
Wirel. Netw
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
18
-
-
33750599100
-
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
-
L. Qian, N. Song, and X. Li, "Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput. Appl., vol. 30, no. 1, pp. 308-330, 2007.
-
(2007)
J. Netw. Comput. Appl
, vol.30
, Issue.1
, pp. 308-330
-
-
Qian, L.1
Song, N.2
Li, X.3
-
19
-
-
84883856631
-
Partitioning avoidance in mobile ad hoc networks using network survivability concepts
-
D. Goyal and J. J. Caffery, "Partitioning avoidance in mobile ad hoc networks using network survivability concepts," in Proc. of IEEE ISCC, 2002.
-
(2002)
Proc. of IEEE ISCC
-
-
Goyal, D.1
Caffery, J.J.2
-
20
-
-
72849145889
-
Adaptation of the breadth first search algorithm for cut-edge detection in wireless multihop networks
-
B. Milic and M. Malek, "Adaptation of the breadth first search algorithm for cut-edge detection in wireless multihop networks," in Proc. of. ACM MSWiM, 2007.
-
(2007)
Proc. of. ACM MSWiM
-
-
Milic, B.1
Malek, M.2
-
21
-
-
33746631403
-
Effectiveness of reliable routing protocols in mobile ad hoc networks
-
K.-I. Kim and S.-H. Kim, "Effectiveness of reliable routing protocols in mobile ad hoc networks," Wirel. Pers. Commun., vol. 38, no. 3, pp. 377-390, 2006.
-
(2006)
Wirel. Pers. Commun
, vol.38
, Issue.3
, pp. 377-390
-
-
Kim, K.-I.1
Kim, S.-H.2
-
22
-
-
7744227596
-
A review of routing protocols for mobile ad hoc networks
-
M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, 2004.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.1
, pp. 1-22
-
-
Abolhasan, M.1
Wysocki, T.2
Dutkiewicz, E.3
-
23
-
-
50949096791
-
Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure
-
M. Khabbazian, H. Mercier, and V. K. Bhargava, "Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure," in Proc. of IEEE GLOBECOM, 2006.
-
(2006)
Proc. of IEEE GLOBECOM
-
-
Khabbazian, M.1
Mercier, H.2
Bhargava, V.K.3
-
24
-
-
51349155697
-
Ctu: Capturing throughput dependencies in uwb networks
-
I. Broustis, A. Vlavianos, P. Krishnamurthy, and S. Krishnamurthy, "Ctu: Capturing throughput dependencies in uwb networks," in Proc. of IEEE INFOCOM, 2008.
-
(2008)
Proc. of IEEE INFOCOM
-
-
Broustis, I.1
Vlavianos, A.2
Krishnamurthy, P.3
Krishnamurthy, S.4
-
26
-
-
34247575139
-
Handling asymmetry in power heterogeneous ad hoc networks
-
V. Shah, E. Gelal, and S. V. Krishnamurthy, "Handling asymmetry in power heterogeneous ad hoc networks," Comput. Netw., vol. 51, no. 10, pp. 2594-2615, 2007.
-
(2007)
Comput. Netw
, vol.51
, Issue.10
, pp. 2594-2615
-
-
Shah, V.1
Gelal, E.2
Krishnamurthy, S.V.3
|