-
1
-
-
32144445424
-
Wireless network security II: Towards resilient geographic routing in WSNs
-
Montreal, Quebec, Canada
-
Abu-Ghazaleh, N., Kang, K.D. and Liu, K. (2005) 'Wireless network security II: towards resilient geographic routing in WSNs', Proceeding of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks Q2SWinet 2005, Montreal, Quebec, Canada, pp.71-78.
-
(2005)
Proceeding of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks Q2SWinet 2005
, pp. 71-78
-
-
Abu-Ghazaleh, N.1
Kang, K.D.2
Liu, K.3
-
2
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
November
-
Acs, G., Buttyán, L. and Vajda, I. (2006) 'Provably secure on-demand source routing in mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 5, No. 11, November, pp.1533-1546.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Acs, G.1
Buttyán, L.2
Vajda, I.3
-
3
-
-
18944373619
-
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
-
16 June
-
Boukerche, A., El-Khatib, K., Xu, L. and Korba, L. (2005) 'An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks', Computer Communications, Vol. 28, No. 10, 16 June, pp.1193-1203.
-
(2005)
Computer Communications
, vol.28
, Issue.10
, pp. 1193-1203
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
4
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
10 January
-
Deng, J., Han, R. and Mishra, S. (2006) 'INSENS: intrusion-tolerant routing for wireless sensor networks', Computer Communications, Vol. 29, No. 2, 10 January, pp.216-230.
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
84947273682
-
The Sybil attack
-
7-8 March, Cambridge, MA, USA
-
Douceur, J.R. (2002) 'The Sybil attack', 1st International Workshop on Peer-to-Peer Systems (IPTPS 02), 7-8 March, Cambridge, MA, USA, pp.251-260.
-
(2002)
1st International Workshop on Peer-to-Peer Systems (IPTPS 02)
, pp. 251-260
-
-
Douceur, J.R.1
-
6
-
-
33646845626
-
Secure cell relay routing protocol for sensor networks
-
May
-
Du, X., Xiao, Y., Chen, H-H. and Wu, Q. (2006) 'Secure cell relay routing protocol for sensor networks', Wireless Communications and Mobile Computing, Vol. 6, No. 3, May, pp.375-391.
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 375-391
-
-
Du, X.1
Xiao, Y.2
Chen, H.-H.3
Wu, Q.4
-
7
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
30 March-3 April
-
Hu, Y-C., Perrig, A. and Johnson, D.B. (2003) 'Packet leashes: a defense against wormhole attacks in wireless networks', Proceeding of INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3, 30 March-3 April, pp.1976-1986.
-
(2003)
Proceeding of INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
8
-
-
11244327295
-
-
in Perkins, C.E. (Ed.), Addison-Wesley Longman Publishing Co. Inc. Boston, MA
-
Johnson, D.B, Maltz, D.A. and Broch, J. (2001) DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, in Perkins, C.E. (Ed.), Addison-Wesley Longman Publishing Co., Inc., Boston, MA, pp.139-172.
-
(2001)
DSR: the Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
9
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
Karlof, C. and Wagner, D. (2003) 'Secure routing in wireless sensor networks: attacks and countermeasures', Ad Hoc Networks, Vol. 1, Nos. 2-3, September, pp.293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
10
-
-
26444471877
-
Resilient cluster-organveing key management and secure routing protocol for mobile ad hoc networks
-
Lin, H.Y., Huang, Y.M. and Wang, T.I. (2005) 'Resilient cluster-organveing key management and secure routing protocol for mobile ad hoc networks', IEICE Transactions on Communications, Vol. E88-B, No. 9, pp.3598-3613.
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.9
, pp. 3598-3613
-
-
Lin, H.Y.1
Huang, Y.M.2
Wang, T.I.3
-
11
-
-
85031307530
-
Highly dynamic Destination-Sequenced Distance-Vector (DSDV) for mobile computers
-
August, London, UK
-
Perkins, C.E. and Bhagwat, P. (1994) 'Highly dynamic Destination- Sequenced Distance-Vector (DSDV) for mobile computers', Proc. ACM Conf. Commun. Architectures and Protocols (SIGCOMM' 94), August, London, UK, pp.234-244.
-
(1994)
Proc. ACM Conf. Commun. Architectures and Protocols (SIGCOMM' 94)
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
12
-
-
34347349933
-
Ad hoc on-demand distance vector routing
-
February, New Orleans, LA
-
Perkins, C.E. and Royer, E.M. (1999) 'Ad hoc on-demand distance vector routing', Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Applications, February, New Orleans, LA, pp.90-100.
-
(1999)
Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Applications
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
13
-
-
33751088577
-
SecRout: A secure routing protocol for sensor networks
-
18-20 April, Vienna, Austria
-
Yin, J. and Madria, V. (2006) 'SecRout: a secure routing protocol for sensor networks', Proceeding of the 20th International Conference on Advanced Information Networking and Applications (AINA'06), 18-20 April, Vienna, Austria, Vol. 1, pp.393-398.
-
(2006)
Proceeding of the 20th International Conference on Advanced Information Networking and Applications (AINA'06)
, vol.1
, pp. 393-398
-
-
Yin, J.1
Madria, V.2
|