-
1
-
-
49049107970
-
-
Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani. Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme. In the proceedings of the IEEE international conference on availability, reliability and security; 2008. pp. 636-41.
-
Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani. Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme. In the proceedings of the IEEE international conference on availability, reliability and security; 2008. pp. 636-41.
-
-
-
-
4
-
-
35148886678
-
Mason, Maoyu Wang, Louise Lamont, Ramiro Liscano. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis
-
In the
-
Gorlatova MA, Peter C. Mason, Maoyu Wang, Louise Lamont, Ramiro Liscano. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. In the proceedings of the IEEE conference on military communications; 2006.
-
(2006)
proceedings of the IEEE conference on military communications
-
-
Gorlatova, M.A.1
Peter, C.2
-
7
-
-
17144380644
-
The dynamic source routing protocol for mobile ad-hoc network (DSR)
-
work in progress, July
-
Johnson DB, Maltz DA, Hu YC. The dynamic source routing protocol for mobile ad-hoc network (DSR), IETF internet draft (work in progress); July 2004.
-
(2004)
IETF internet draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.C.3
-
9
-
-
50049132985
-
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
-
In the
-
Issa Khalil, Saurabh Bagchi, and Ness B. Shroff. MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. In the IEEE securecomm and workshops; 2006. pp. 1-12
-
(2006)
IEEE securecomm and workshops
, pp. 1-12
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
10
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
In the
-
Lazos L, Poovendran R, Meadows C, Syverson P, Chang LW. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In the proceedings of the IEEE conference on wireless communications and networking; 2005, vol. 2. pp. 1193-9.
-
(2005)
proceedings of the IEEE conference on wireless communications and networking
, vol.2
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
13
-
-
36349035274
-
-
Farid Nai{dotless}t-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol. In the proceedings of the IEEE conference on wireless communications and networking; 2007. pp. 3117-22.
-
Farid Nai{dotless}t-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol. In the proceedings of the IEEE conference on wireless communications and networking; 2007. pp. 3117-22.
-
-
-
-
15
-
-
47349087906
-
-
Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, and Heejo Lee. Transmission time-based mechanism to detect wormhole attacks. In the proceedings of the IEEE Asia-Pacific service computing conference; 2007. pp. 172-8
-
Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, and Heejo Lee. Transmission time-based mechanism to detect wormhole attacks. In the proceedings of the IEEE Asia-Pacific service computing conference; 2007. pp. 172-8
-
-
-
-
16
-
-
74149084195
-
-
Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. A Secure routing protocol for ad hoc networks. In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.
-
Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. A Secure routing protocol for ad hoc networks. In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.
-
-
-
-
20
-
-
34247527847
-
-
Xia Wang, Intrusion detection techniques in wireless ad hoc networks. In the proceedings of the IEEE international computer software and applications conference; 2006
-
Xia Wang, Intrusion detection techniques in wireless ad hoc networks. In the proceedings of the IEEE international computer software and applications conference; 2006.
-
-
-
-
21
-
-
37349001578
-
-
Xia Wang and Johnny Wong, An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference COMPSAC, 2007
-
Xia Wang and Johnny Wong, An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference (COMPSAC); 2007.
-
-
-
|