-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
A. Akyildiz, I.F. Su, W. Sankarasubramaniam, and E. Cayirci. "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, A.1
Su, I.F.2
Sankarasubramaniam, W.3
Cayirci, E.4
-
2
-
-
33646518088
-
Middleware challenges and approaches for wireless sensor networks
-
Mar.
-
S. Hadim and S.N. Mohamed. "Middleware challenges and approaches for wireless sensor networks," IEEE Distributed Systems, vol. 7, no. 3, pp. 1-23, Mar. 2006.
-
(2006)
IEEE Distributed Systems
, vol.7
, Issue.3
, pp. 1-23
-
-
Hadim, S.1
Mohamed, S.N.2
-
4
-
-
75449110050
-
A percolation model of mobile ad-hoc networks
-
H. Mohammadi, E.N. Oskoee, M. Afsharchi, N. Yazdani, and M. Sahimi. "A percolation model of mobile ad-hoc networks," International Journal of Modern Physics C (IJMPC), vol. 20, no. 12, pp. 1871-902, 2009.
-
(2009)
International Journal of Modern Physics C (IJMPC)
, vol.20
, Issue.12
, pp. 1871-1902
-
-
Mohammadi, H.1
Oskoee, E.N.2
Afsharchi, M.3
Yazdani, N.4
Sahimi, M.5
-
5
-
-
44149118108
-
-
The George Washington University Technical Report GWU-CS-TR-010-05
-
K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng. "Attacks and countermeasures in sensor networks: A survey," The George Washington University Technical Report GWU-CS-TR-010-05, 2005.
-
(2005)
Attacks and Countermeasures in Sensor Networks: A Survey
-
-
Xing, K.1
Srinivasan, S.2
Rivera, M.3
Li, J.4
Cheng, X.5
-
6
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. "A Survey of key management schemes in wireless sensor networks," Computer Communications Journal, Special issue on security on wireless ad-hoc and sensor networks, vol. 30, no. 11-12, pp. 2314-41, Sep. 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
7
-
-
70349968010
-
Attacks and countermeasures in multi-hop cognitive radio networks
-
F. Hu, D. Dong, and Y. Xiao. "Attacks and countermeasures in multi-hop cognitive radio networks," International Journal of Security and Networks, vol. 4, no. 4, pp. 263-71, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 263-271
-
-
Hu, F.1
Dong, D.2
Xiao, Y.3
-
8
-
-
77949692385
-
Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
-
G.C. Dalton II, K. S. Edge, R. F. Mills, and R.A. Raines. "Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees," International Journal of Security and Networks, vol. 5, no. 2/3, pp. 87-95, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Dalton Ii, G.C.1
Edge, K.S.2
Mills, R.F.3
Raines, R.A.4
-
9
-
-
77949765115
-
On the security of RFID devices against implementation attacks
-
M. Hutter, T. Plos, and M. Feldhofer. "On the security of RFID devices against implementation attacks," International Journal of Security and Networks, vol. 5, no. 2/3, pp. 106-18, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 106-118
-
-
Hutter, M.1
Plos, T.2
Feldhofer, M.3
-
10
-
-
44649095872
-
A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks
-
V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris. "A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks," International Journal of Security and Networks, vol. 1, no. 3/4, pp. 255-65, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
11
-
-
84860204995
-
Security wireless sensor networks: Problems and solutions," (manuscript in Turkish)
-
Gazi University, Ankara, Turkey,Jan.
-
M. Meghdadi, S. Özdemir, and Ý. Güler. "Security wireless sensor networks: Problems and solutions," (manuscript in Turkish), Journal of HInformatics Technologies, Gazi University, Ankara, Turkey, vol. 1, no. 1, pp. 35-42, Jan. 2008.
-
(2008)
Journal of HInformatics Technologies
, vol.1
, Issue.1
, pp. 35-42
-
-
Meghdadi, M.1
Özdemir, S.2
Güler, Ý.3
-
12
-
-
79953770822
-
An algorithm for defending blackhole attacks in wireless sensor networks," (manuscript in Turkish)
-
Oct.
-
M. Meghdadi, S. Özdemir, and Ý. Güler. "An algorithm for defending blackhole attacks in wireless sensor networks," (manuscript in Turkish), Proc. of HABTEKUS 08, pp. 71-6, Oct. 2008.
-
(2008)
Proc. of HABTEKUS 08
, pp. 71-76
-
-
Meghdadi, M.1
Özdemir, S.2
Güler, Ý.3
-
13
-
-
1842815887
-
Security in mobile ad-hoc networks: Challenges and solution
-
Feb.
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. "Security in mobile ad-hoc networks: Challenges and solution," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
14
-
-
0003597249
-
-
Department of Computer Science, Rice University, Technical Report TR01-384, Jun.
-
Y.C. Hu, A. Perrig, and D.B. Johnson, "Wormhole detection in wireless ad-hoc networks," Department of Computer Science, Rice University, Technical Report TR01-384, Jun. 2002.
-
(2002)
Wormhole Detection in Wireless Ad-hoc Networks
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks
-
Apr.
-
Y.C. Hu, A. Perrig, and D.B. Johnson. "Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks," Proceedings of 22nd IEEE INFOCOM, pp. 1976-86, Apr. 2003.
-
(2003)
Proceedings of 22nd IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
DOI 10.1007/s11276-006-3723-x
-
R. Poovendran and L. Lazos. "A graph theoretic framework for preventing the wormhole attack in wireless ad-hoc networks," Wireless Networks, vol. 13, no. 1, pp. 27-59, Jan. 2007. (Pubitemid 46034258)
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
17
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
PHY53-5, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L.W. Chang. "Preventing wormhole attacks on wireless ad-hoc networks: A graph theoretic approach," in Preceding of Wireless Communications and Networking Conference, vol. 2, pp. 1193-9, Mar. 2005. (Pubitemid 41311090)
-
(2005)
IEEE Wireless Communications and Networking Conference, WCNC
, vol.2
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
18
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
R. Maheshwari, J. Gao, and S.R. Das. "Detecting wormhole attacks in wireless networks using connectivity information," Proceeding of IEEE International Conference on Computer Communication, pp. 107-15, May 2007. (Pubitemid 47334221)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
19
-
-
61349151189
-
Severity analysis and countermeasure for the wormhole attack in wireless ad-hoc networks
-
Feb.
-
M. Khabbazian, H. Mercier, and V.K. Bhargava. "Severity analysis and countermeasure for the wormhole attack in wireless ad-hoc networks," IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 736-45, Feb. 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.2
, pp. 736-745
-
-
Khabbazian, M.1
Mercier, H.2
Bhargava, V.K.3
-
21
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Feb.
-
R. Berthier and M. Cukier. "An evaluation of connection characteristics for separating network attacks," International Journal of Security and Networks, vol. 4, no. 1/2, pp. 110-24, Feb. 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
22
-
-
35348910049
-
Wireless sensor network security: A survey
-
editor, London, Auerbach Publications
-
J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," Security in Distributed, Grid, and Pervasive Computing In Y. Xiao, editor, London, pp. 3-50, Auerbach Publications, 2006.
-
(2006)
Security in Distributed, Grid, and Pervasive Computing in Y. Xiao
, pp. 3-50
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
23
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
D.R. Raymond and S.F. Midkiff. "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
24
-
-
0036793924
-
Denial-of-service in sensor networks
-
Oct.
-
A.D. Wood and J.A. Stankovic. "Denial-of-service in sensor networks," IEEE Computer Society Press, vol. 35, no. 10, pp 54-62, Oct. 2002.
-
(2002)
IEEE Computer Society Press
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
25
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Y. Zhu, X. Fu, R. Bettati, and W. Zhao. "Analysis of flow-correlation attacks in anonymity network," International Journal of Security and Networks, vol. 2, no. 1/2, pp. 137-53, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
26
-
-
79951648076
-
LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad-hoc network
-
H.Y. Hsu, S. Zhu, and A.R. Hurson. "LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad-hoc network," International Journal of Security and Networks, vol. 2, no. 3/4, pp. 202-15, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.Y.1
Zhu, S.2
Hurson, A.R.3
-
27
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
S. Ehlert, Y. Rebahi, and T. Magedanz. "Intrusion detection system for denial-of-service flooding attacks in SIP communication networks," International Journal of Security and Networks, vol. 4, no. 3, pp. 189-200, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
28
-
-
84890880165
-
Limiting DoS attacks during multi-hop data delivery in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra. "Limiting DoS attacks during multi-hop data delivery in wireless sensor networks," International Journal of Security and Networks, vol. 1, no. 3/4, pp. 167-78, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
29
-
-
33750397274
-
DePHI: Wormhole detection mechanism for ad hoc wireless networks
-
2006 1st International Symposium on Wireless Pervasive Computing
-
H.S. Chiu and K.S. Lui. "DelPHI: Wormhole detection mechanism for ad-hoc wireless networks," 1st International Symposium on Wireless Pervasive Computing, 6 pp. 1-6, Jan. 2006. (Pubitemid 44643077)
-
(2006)
2006 1st International Symposium on Wireless Pervasive Computing
, vol.2006
, pp. 1-6
-
-
Chiu, H.S.1
Lui, K.-S.2
-
30
-
-
36348954892
-
TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks
-
DOI 10.1109/CCNC.2007.122, 4199210, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
-
P.V. Tran, L.X. Hung, Y.K. Lee, S. Lee, and H. Lee. "TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks," 4th IEEE Consumer Communication and Networking Conference (CCNC'07), pp. 593-8, May 2007. (Pubitemid 350141498)
-
(2007)
2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
, pp. 593-598
-
-
Van Tran, P.1
Hung, L.X.2
Lee, Y.-K.3
Lee, S.4
Lee, H.5
-
31
-
-
79953789469
-
A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks
-
May
-
R. Venkataraman, M. Pushpalatha, T.R. Rao, and R. Khemka. "A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks," International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.
-
(2009)
International Journal of Recent Trends in Engineering
, vol.1
, Issue.2
-
-
Venkataraman, R.1
Pushpalatha, M.2
Rao, T.R.3
Khemka, R.4
-
33
-
-
58149526685
-
Defending mechanisms against sybil attack in next generation mobile adhoc networks
-
Jul-Aug.
-
S. Pal, A.K. Mukhopadhyay, and P.P. Bhattacharya. "Defending mechanisms against sybil attack in next generation mobile adhoc networks," ITEE Technical Review Journal, vol. 25, no. 4, pp. 209-14, Jul-Aug. 2008.
-
(2008)
ITEE Technical Review Journal
, vol.25
, Issue.4
, pp. 209-214
-
-
Pal, S.1
Mukhopadhyay, A.K.2
Bhattacharya, P.P.3
-
35
-
-
33744472182
-
Preventing impersonation attacks in MANET with multi-factor authentication
-
DOI 10.1109/WIOPT.2005.42, 1421092, Proceedings - WiOpt 2005: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
-
D. Glynos, P. Kotzanikolaou, and C. Douligeris. "Preventing impersonation attacks in MANET with multi-factor authentication," Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp. 59-64, Apr. 2005. (Pubitemid 43803532)
-
(2005)
Proceedings - WiOpt 2005: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, vol.2005
, pp. 59-64
-
-
Glynos, D.1
Kotzanikolaou, P.2
Douligeris, C.3
-
37
-
-
58149526685
-
Defending mechanisms against sybil attack in next generation mobile ad-hoc networks
-
Jul- Aug.
-
S. Pal, A.K. Mukhopadhyay, and P.P. Bhattacharya. "Defending mechanisms against sybil attack in next generation mobile ad-hoc networks," IETE Technical Review, vol 25, no 4, pp. 209-14, Jul- Aug. 2008.
-
(2008)
IETE Technical Review
, vol.25
, Issue.4
, pp. 209-214
-
-
Pal, S.1
Mukhopadhyay, A.K.2
Bhattacharya, P.P.3
-
39
-
-
3042647758
-
A survey of secure wireless ad-hoc routing
-
May
-
Y.C. Hu and A. Perrig. "A survey of secure wireless ad-hoc routing," Security and Privacy Magazine, IEEE, vol. 2, no 3, pp. 28-39, May 2004.
-
(2004)
Security and Privacy Magazine, IEEE
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.C.1
Perrig, A.2
-
43
-
-
84943681390
-
A survey of wormhole routing techniques in direct networks
-
Feb.
-
L.M. Ni and P.K. McKinley. "A survey of wormhole routing techniques in direct networks," IEEE Computer, vol. 26, no. 2, pp. 62-76, Feb. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.2
, pp. 62-76
-
-
Ni, L.M.1
McKinley, P.K.2
-
44
-
-
0041663475
-
Opportunistic large arrays: Cooperative transmission in wireless multi-hop ad-hoc networks to reach far distances
-
Aug.
-
A. Scaglione and Y.W. Hong. "Opportunistic large arrays: Cooperative transmission in wireless multi-hop ad-hoc networks to reach far distances," IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2082-92, Aug. 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.8
, pp. 2082-2092
-
-
Scaglione, A.1
Hong, Y.W.2
-
45
-
-
84904904836
-
A secure routing protocol for ad-hoc networks
-
Nov.
-
K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer. "A secure routing protocol for ad-hoc networks," Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 02), pp. 78-87, Nov. 2002.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 02)
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Belding-Royer, E.4
-
46
-
-
79953768093
-
Taxonomy of attacks on wireless sensor networks
-
Dec.
-
S. Han, E. Chang, L. Gao, and T. Dillon. "Taxonomy of attacks on wireless sensor networks," Proceeding of the First European Conference on Computer Network Defense School of Computing, pp. 97-105, Dec. 2005.
-
(2005)
Proceeding of the First European Conference on Computer Network Defense School of Computing
, pp. 97-105
-
-
Han, S.1
Chang, E.2
Gao, L.3
Dillon, T.4
-
48
-
-
24744448664
-
Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks
-
Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
-
T. Korkmaz. "Verifying physical presence of neighbors against replay-based attacks in wireless ad-hoc networks," International Conference On Information Technology: Coding and Computing 2005(ITCC 2005), pp. 704-9, 2005. (Pubitemid 41290309)
-
(2005)
International Conference on Information Technology: Coding and Computing, ITCC
, vol.2
, pp. 704-709
-
-
Korkmaz, T.1
-
49
-
-
1542317831
-
Rushing attacks and defense in wireless ad-hoc network routing protocols
-
Y.C. Hu, A. Perring, and D. Johnson. "Rushing attacks and defense in wireless ad-hoc network routing protocols," ACM Workshop on Wireless Security, pp. 30-40, 2003.
-
(2003)
ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.C.1
Perring, A.2
Johnson, D.3
-
51
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
Oct.
-
S. Capkun, L. Buttyán, and J.P. Hubaux, "SECTOR: Secure tracking of node encounters in multi-hop wireless networks," Proceedings of the 1st ACM workshop on Security of ad-hoc and sensor networks (SASN 03), pp.21-32, Oct. 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN 03)
, pp. 21-32
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.P.3
-
52
-
-
33744502133
-
Secure OLSR
-
DOI 10.1109/AINA.2005.305, 1423573, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
F. Hong, L. Hong, and C. Fu. "Secure OLSR," 19th International Conference On Advanced Information Networking and Applications (AINA 2005), vol. 1, 25-30, pp. 713-8, Mar. 2005. (Pubitemid 43803915)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.1
, pp. 713-718
-
-
Hong, F.1
Hong, L.2
Fu, C.3
-
53
-
-
33745736659
-
Statistical wormhole detection in sensor networks
-
Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
L. Buttyan, L. Dora, and I. Vajda. "Statistical wormhole detection in sensor networks," Second European Workshop on Security and Privacy in ad-hoc and Sensor Networks (ESAS 2005), pp. 128-41, Jul. 2005. (Pubitemid 44012979)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 128-141
-
-
Buttyan, L.1
Dora, L.2
Vajda, I.3
-
55
-
-
1542356506
-
The dynamic source routing protocol for mobile ad-hoc networks
-
D.B. Johnson, D.A. Maltz, and Y. Hu. "The dynamic source routing protocol for mobile ad-hoc networks," IETF MANET, Internet Draft. Available from: http://www.cs.cmu.edu/~dmaltz/internetdrafts/ draft-ietf-manet-dsr-09.txt [last cited in 2003].
-
(2003)
IETF MANET, Internet Draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.3
-
56
-
-
55849140487
-
An efficient DSDV routing protocol for wireless mobile ad-hoc networks and its performance comparison
-
Sep.
-
K.U. Khan, A.V. Reddy, R.U. Zaman, K.A. Reddy, and T.S. Harsha. "An efficient DSDV routing protocol for wireless mobile ad-hoc networks and its performance comparison," Second UKSIM European Symposium on Computer Modeling and Simulation, pp. 506-11, Sep. 2008.
-
(2008)
Second UKSIM European Symposium on Computer Modeling and Simulation
, pp. 506-511
-
-
Khan, K.U.1
Reddy, A.V.2
Zaman, R.U.3
Reddy, K.A.4
Harsha, T.S.5
-
57
-
-
47349087906
-
Transmission time-based mechanism to detect wormhole attacks
-
T.V. Phuong, N.T. Canh, Y.K. Lee, S. Lee, and H. Lee. "Transmission time-based mechanism to detect wormhole attacks," IEEE Asia- Pacific Services Computing Conference, pp. 172-8, 2007.
-
(2007)
IEEE Asia- Pacific Services Computing Conference
, pp. 172-178
-
-
Phuong, T.V.1
Canh, N.T.2
Lee, Y.K.3
Lee, S.4
Lee, H.5
-
58
-
-
0036953714
-
Using directional antennas for medium access control in adhoc networks
-
R.R. Choudhury, X. Yang, N.H. Vaidya, and R. Ramanathan. "Using directional antennas for medium access control in adhoc networks," MobiCom'02: Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 59-70, 2002.
-
(2002)
MobiCom'02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 59-70
-
-
Choudhury, R.R.1
Yang, X.2
Vaidya, N.H.3
Ramanathan, R.4
-
59
-
-
0242443783
-
On the capacity improvement of ad-hoc wireless networks using directional antennas
-
New York, NY, USA: ACM Press
-
S. Yi, Y. Pei, and S. Kalyanaraman. "On the capacity improvement of ad-hoc wireless networks using directional antennas," MobiHoc 2003, Proceedings of the 4th ACM international symposium on Mobile ad-hoc networking and computing. New York, NY, USA: ACM Press; pp. 108-16, 2003.
-
(2003)
MobiHoc 2003, Proceedings of the 4th ACM International Symposium on Mobile Ad-hoc Networking and Computing
, pp. 108-116
-
-
Yi, S.1
Pei, Y.2
Kalyanaraman, S.3
-
60
-
-
0242696194
-
Directional virtual carrier sensing for directional antennas in mobile ad-hoc networks
-
M. Takai, J. Martin, R. Bagrodia, and A. Ren. "Directional virtual carrier sensing for directional antennas in mobile ad-hoc networks," MobiHoc'02, Proceedings of the 3rd ACM international symposium on Mobile ad- hoc networking and computing, pp.183-93, 2002.
-
(2002)
MobiHoc'02, Proceedings of the 3rd ACM International Symposium on Mobile Ad- Hoc Networking and Computing
, pp. 183-193
-
-
Takai, M.1
Martin, J.2
Bagrodia, R.3
Ren, A.4
-
65
-
-
79953796867
-
A time and trust based wormhole detection algorithm for wireless sensor networks
-
manuscript in Turkish
-
S. Özdemir, M. Meghdadi, and Ý. Güler. "A time and trust based wormhole detection algorithm for wireless sensor networks," (manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC'08), pp. 139-4, 2008.
-
(2008)
3rd Information Security and Cryptology Conference (ISC'08)
, pp. 139-144
-
-
Özdemir, S.1
Meghdadi, M.2
Güler, Ý.3
-
66
-
-
79953792886
-
Circumventing sinkholes and wormholes in ad-hoc wireless networks
-
London, England, Kings College, London
-
A.A. Pirzada and C.S. McDonald. "Circumventing sinkholes and wormholes in ad-hoc wireless networks," Proceedings of International Workshop on Wireless Ad-hoc Networks, London, England, Kings College, London, 2005.
-
(2005)
Proceedings of International Workshop on Wireless Ad-hoc Networks
-
-
Pirzada, A.A.1
McDonald, C.S.2
-
67
-
-
80052648287
-
A secure localization approach against wormhole attacks using distance consistency
-
H. Chen, W. Lou, X. Sun, and Z. Wang. "A secure localization approach against wormhole attacks using distance consistency," EURASIP Journal on Wireless Communication and Networking- Special Issue on Wireless Network Algorithms, Systems, and Applications, pp. 22-32, 2010.
-
(2010)
EURASIP Journal on Wireless Communication and Networking- Special Issue on Wireless Network Algorithms, Systems, and Applications
, pp. 22-32
-
-
Chen, H.1
Lou, W.2
Sun, X.3
Wang, Z.4
-
68
-
-
70350638584
-
Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
-
H. Chen, W. Lou, and Z. Wang. "Conflicting-set-based wormhole attack resistant localization in wireless sensor networks," Book Chapter Lecture Notes in Computer Science - Ubiqitous Intelligence and Computing, vol. 5585/2009, pp. 296-309, 2009.
-
(2009)
Book Chapter Lecture Notes in Computer Science- Ubiqitous Intelligence and Computing
, vol.5585
, Issue.2009
, pp. 296-309
-
-
Chen, H.1
Lou, W.2
Wang, Z.3
-
69
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
L. Lazos and R. Poovendran, "Serloc: Secure range-independent localization for wireless sensor networks," Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, Oct. 2004. (Pubitemid 40062792)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
70
-
-
70349157241
-
A practical secure neighbor verification protocol for wireless sensor networks
-
R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.P. Hubaux. "A practical secure neighbor verification protocol for wireless sensor networks," ACM WiSec, 2009.
-
(2009)
ACM WiSec
-
-
Shokri, R.1
Poturalski, M.2
Ravot, G.3
Papadimitratos, P.4
Hubaux, J.P.5
-
71
-
-
37549006809
-
MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks
-
I. Khalil, S. Bagchi, and N.B. Shroff. "MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks," Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344-62, 2008.
-
(2008)
Elsevier Ad Hoc Networks
, vol.6
, Issue.3
, pp. 344-362
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
72
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad-hoc networking
-
Feb.
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J.P. Hubaux. "Secure neighborhood discovery: A fundamental element for mobile ad-hoc networking," IEEE Communications Magazine, Feb. 2008.
-
(2008)
IEEE Communications Magazine
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Capkun, S.6
Hubaux, J.P.7
-
73
-
-
58049188696
-
Secure neighbor discovery in wireless networks: Formal investigation of possibility
-
M. Poturalski, P. Papadimitratos, and J.P. Hubaux. "Secure neighbor discovery in wireless networks: Formal investigation of possibility," ACM ASIACCS2008, pp. 189-200, 2008.
-
(2008)
ACM ASIACCS2008
, pp. 189-200
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.P.3
-
74
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson. "Wormhole attacks in wireless networks," IEEE Journal on Selected Areas of Communications, vol. 24, no. 2, pp. 370-80, 2006.
-
(2006)
IEEE Journal on Selected Areas of Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
75
-
-
85016596484
-
LISP: A lightweight security protocol for wireless sensor networks
-
T. Park and K. Shin. "LISP: A lightweight security protocol for wireless sensor networks," Proceedings of ACM transaction on Embedded Computing systems, vol. 3, no. 3, pp. 634-60, 2004.
-
(2004)
Proceedings of ACM Transaction on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.2
-
76
-
-
33847279913
-
On the survivability of routing protocols in ad-hoc wireless networks
-
A. Baruch, R. Curmola, C. Nita- Rotaru, D. Holmer, and H. Rubens. "On the survivability of routing protocols in ad-hoc wireless networks," First International Conference on Security and Privacy for Emerging Areas Communications, pp. 327-38, 2005.
-
(2005)
First International Conference on Security and Privacy for Emerging Areas Communications
, pp. 327-338
-
-
Baruch, A.1
Curmola, R.2
Nita-Rotaru, C.3
Holmer, D.4
Rubens, H.5
-
77
-
-
33745403778
-
Defending against wormhole attacks in mobile ad-hoc networks
-
W. Weichao, B. Bharat, Y. Lu, and X. Wu. "Defending against wormhole attacks in mobile ad-hoc networks," Wireless Communication and Mobile Computing, vol. 6, no. 4, pp 483-503, 2006.
-
(2006)
Wireless Communication and Mobile Computing
, vol.6
, Issue.4
, pp. 483-503
-
-
Weichao, W.1
Bharat, B.2
Lu, Y.3
Wu, X.4
-
78
-
-
79953792064
-
Detection of wormhole attacks in wireless sensor networks
-
Distributed
-
R. Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini. Distributed "Detection of wormhole attacks in wireless sensor networks," Springer book chapter Ad Hoc Networks, vol. 28, pp. 208-22, 2010.
-
(2010)
Springer Book Chapter Ad Hoc Networks
, vol.28
, pp. 208-222
-
-
Graaf, R.1
Hegazy, I.2
Horton, J.3
Safavi-Naini, R.4
-
79
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li. "Establishing pair-wise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no.1, pp. 41-77, 2005. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
80
-
-
54949103489
-
Functional reputation based reliable data aggregation and transmission for wireless sensor networks
-
Elsevier
-
S. Ozdemir, "Functional reputation based reliable data aggregation and transmission for wireless sensor networks," Computer Communications, Elsevier, vol. 31, no. 17, pp. 3941-53, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 3941-3953
-
-
Ozdemir, S.1
|