-
1
-
-
33646552392
-
Secure routing and Intrusion Detection in ad hoc networks
-
DOI 10.1109/PERCOM.2005.38, 1392755, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: 3rd IEEE International Conference on Pervasive Computing and Communications, pp. 191-199. IEEE Press, Los Alamitos (2005) (Pubitemid 43727928)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
2
-
-
33847173839
-
Detecting selective forwarding attacks in wireless sensor networks
-
IEEE Press, Los Alamitos
-
Yu, B., Xiao, B.: Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In: 20th International Parallel and Distributed Processing Symposium, pp. 8-15. IEEE Press, Los Alamitos (2006)
-
(2006)
20th International Parallel and Distributed Processing Symposium
, pp. 8-15
-
-
Yu, B.1
Xiao, B.2
-
3
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
DOI 10.1109/ICC.2006.255595, 4024996, 2006 IEEE International Conference on Communications, ICC 2006
-
Ngai, E.C.H., Lie, J., Lyu, M.R.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: IEEE International Conference on Communications, pp. 3383-3389. IEEE Press, Los Alamitos (2006) (Pubitemid 351575997)
-
(2006)
IEEE International Conference on Communications
, vol.8
, pp. 3383-3389
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
-
4
-
-
46149096001
-
Truelink: A practical countermeasure to thewormhole attack in wireless networks
-
IEEE Press, Los Alamitos
-
Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A Practical Countermeasure to theWormhole Attack in Wireless Networks. In: 14th IEEE International Conference on Network Protocols, pp. 75-84. IEEE Press, Los Alamitos (2006)
-
(2006)
14th IEEE International Conference on Network Protocols
, pp. 75-84
-
-
Eriksson, J.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
5
-
-
0013410294
-
-
Master's thesis, Dept. of Electrical Eng. and Computer Science. University of California at Berkeley
-
Hill, J.: A Software Architecture Supporting Networked Sensors. Master's thesis, Dept. of Electrical Eng. and Computer Science. University of California at Berkeley (2000)
-
(2000)
A Software Architecture Supporting Networked Sensors
-
-
Hill, J.1
-
6
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J., Szewczky, R., Woo, A., Hollar, S., Vuller, D., Pister, K.: System Architecture Directions for Networked Sensors. In: 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 93-104 (2000) (Pubitemid 32474159)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
8
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Kutyłowski, M., Cichón, J., Kubiak, P. (eds.) ALGOSENSORS 2007, Springer, Heidelberg
-
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichón, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150-161. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4837
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
9
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis & Defenses
-
ACM, New York
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268. ACM, New York (2004)
-
(2004)
3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
10
-
-
11244309139
-
Visualization of wormholes in sensor networks
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: ACM Workshop on Wireless Security, pp. 51-60. ACM, New York (2004) (Pubitemid 40062795)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 51-60
-
-
Wang, W.1
Bhargava, B.2
-
11
-
-
33745736659
-
Statistical wormhole detection in sensor networks
-
Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
Buttyn, L., Dora, L., Vajda, I.: Statistical Wormhole Detection in Sensor Networks. In: 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, pp. 128-141. Springer, Berlin (2005) (Pubitemid 44012979)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 128-141
-
-
Buttyan, L.1
Dora, L.2
Vajda, I.3
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
IEEE Press, Los Alamitos
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976-1986. IEEE Press, Los Alamitos (2003)
-
(2003)
22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
27544468419
-
LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: International Conference on Dependable Systems and Networks, pp. 612-621. IEEE Computer Society, Washington (2005) (Pubitemid 41538275)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
14
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: 26th IEEE International Conference on Computer Communications, pp. 107-115. IEEE Press, Anchorage (2007) (Pubitemid 47334221)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
|