-
1
-
-
4344576243
-
Establishing trust in pure ad-hoc networks
-
A.A. Pirzada and C. McDonald, "Establishing Trust in Pure Ad-Hoc Networks," Proc. Australasian Conf. Computer Science (ACSC '04), vol. 26, no. 1, pp. 47-54, 2004.
-
(2004)
Proc. Australasian Conf. Computer Science (ACSC '04)
, vol.26
, Issue.1
, pp. 47-54
-
-
Pirzada, A.A.1
McDonald, C.2
-
2
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc NeTworks
-
S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness in Distributed Ad-Hoc NeTworks," Proc. ACM MobiHoc, pp. 80-91, 2002.
-
(2002)
Proc. ACM MobiHoc
, pp. 80-91
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
4
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y.C. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. ACM Workshop Wireless Security (WiSe '03), pp. 30-40, 2003.
-
(2003)
Proc. ACM Workshop Wireless Security (WiSe '03)
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
5
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, pp. 1976-986, 2003.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1976-986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
27544468419
-
LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
I. Khalil, S. Bagchi, and N. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks (DSN '05), pp. 612-621, 2005. (Pubitemid 41538275)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 612-621
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
7
-
-
37549006809
-
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
-
May
-
I. Khalil, S. Bagchi, and N.B. Shroff, "MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.3
, pp. 344-362
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
8
-
-
70349743699
-
UNMASK: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
-
I. Khalil, S. Bagchi, C. Nina-Rotaru, and N. Shroff, "UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks," Ad Hoc Networks, vol. 8, no. 2, pp. 148-164, 2010.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.2
, pp. 148-164
-
-
Khalil, I.1
Bagchi, S.2
Nina-Rotaru, C.3
Shroff, N.4
-
9
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in Ad hoc networks
-
S.J. Lee and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC '01), pp. 3201-3205, 2001. (Pubitemid 32796984)
-
(2001)
IEEE International Conference on Communications
, vol.10
, pp. 3201-3205
-
-
Lee, S.-J.1
Gerla, M.2
-
10
-
-
85116427082
-
Defending against sybil attacks in sensor networks
-
Q. Zhang, P. Wang, D. Reeves, and P. Ning, "Defending against Sybil Attacks in Sensor Networks," Proc. Int'l Workshop Security in Distributed Computing Systems (SDCS '05), pp. 185-191, 2005.
-
(2005)
Proc. Int'l Workshop Security in Distributed Computing Systems (SDCS '05)
, pp. 185-191
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.3
Ning, P.4
-
11
-
-
27544510780
-
Neutralization of errors and attacks in wireless ad hoc networks
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
C. Basile, Z. Kalbarczyk, and R.K. Iyer, "Neutralization of Errors and Attacks in Wireless Ad Hoc Networks," Proc. Int'l Conf. Dependable Systems and Networks (DSN '05), pp. 518-527, 2005. (Pubitemid 41538266)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 518-527
-
-
Basile, C.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
12
-
-
11244309425
-
JANUS: Towards robust and malicious resilient routing in hybrid wireless networks
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
B. Carbunar, I. Ioannidis, and C. Nita-Rotaru, "JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks," Proc. ACM Workshop Wireless Security (WiSe '04), pp. 11-20, 2004. (Pubitemid 40062791)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 11-20
-
-
Carbunar, B.1
Ioannidis, I.2
Nita-Rotaru, C.3
-
13
-
-
39149117709
-
ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Trans. Information and System Security, vol. 10, no. 4, 2008.
-
(2008)
ACM Trans. Information and System Security
, vol.10
, Issue.4
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
14
-
-
33745736659
-
Statistical wormhole detection in sensor networks
-
eds.
-
"Statistical Wormhole Detection in Sensor Networks," Lecture Notes in Computer Science, R. Molva, G. Tsudik, and D. Westhoff, eds., pp. 128-141, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 128-141
-
-
Molva, R.1
Tsudik, G.2
Westhoff, D.3
-
16
-
-
0001341422
-
The dynamic source routing protocol for multihop wireless ad hoc networks
-
Addison-Wesley
-
D. Johnson, D. Maltz, and J. Broch, "The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks," Ad Hoc Networking, Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
18
-
-
0003657779
-
An empirical study of epidemic algorithms in large scale multihop wireless networks
-
Intel Research, Mar.
-
D. Ganesan, B. Krishnamurthy, A. Woo, D. Culler, D. Estrin, and S. Wicker, "An Empirical Study of Epidemic Algorithms in Large Scale Multihop Wireless Networks," Technical Report Intel IRP-TR-02-003, Intel Research, Mar. 2002.
-
(2002)
Technical Report Intel IRP-TR-02-003
-
-
Ganesan, D.1
Krishnamurthy, B.2
Woo, A.3
Culler, D.4
Estrin, D.5
Wicker, S.6
-
19
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM SIGCOMM Computer Comm. Rev., vol. 24, pp. 234-244, 1994.
-
(1994)
ACM SIGCOMM Computer Comm. Rev.
, vol.24
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
20
-
-
79959493247
-
-
"The Network Simulator - ns-2," http://www.isi.edu/nsnam/ns, 2011.
-
(2011)
-
-
-
21
-
-
77955112540
-
Secure neighbor discovery in wireless sensor networks
-
S. Bagchi, S. Hariharan, and N.B. Shroff "Secure Neighbor Discovery in Wireless Sensor Networks," Technical Report ECE 07-19, Purdue Univ, http://docs.lib.purdue.edu/ecetr/360, 2007.
-
(2007)
Technical Report ECE 07-19, Purdue Univ
-
-
Bagchi, S.1
Hariharan, S.2
Shroff, N.B.3
-
22
-
-
33747378828
-
Jamming attack detection and countermeasures in wireless sensor network using ant system
-
R. Muraleedharan and L.A. Osadciw, "Jamming Attack Detection and Countermeasures in Wireless Sensor Network Using Ant System," Proc. Wireless Sensing and Processing, vol. 6248, p. 62480G, 2006.
-
(2006)
Proc. Wireless Sensing and Processing
, vol.6248
-
-
Muraleedharan, R.1
Osadciw, L.A.2
-
24
-
-
36048983204
-
SLAM: Sleep-wake aware local monitoring in sensor networks
-
DOI 10.1109/DSN.2007.88, 4273007, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
-
I. Khalil, S. Bagchi, and N. Shroff, "SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks," Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), pp. 565-574, June 2007. (Pubitemid 350080461)
-
(2007)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 565-574
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
25
-
-
1542317849
-
Secure verification of location claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," Proc. ACM Workshop Wireless Security (WiSe '03), pp. 1-10, 2003.
-
(2003)
Proc. ACM Workshop Wireless Security (WiSe '03)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
27
-
-
77955112540
-
Secure neighbor discovery in wireless sensor networks
-
S. Hariharan, N. Shroff, and S. Bagchi, "Secure Neighbor Discovery in Wireless Sensor Networks," Technical Report ECE 07-19, Purdue Univ., 2007.
-
(2007)
Technical Report ECE 07-19, Purdue Univ.
-
-
Hariharan, S.1
Shroff, N.2
Bagchi, S.3
-
28
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. Sixth Ann. Int'l Conf. Mobile Computing and Networks, pp. 255-265, 2000. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
29
-
-
25844459081
-
A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
R. de Oliveira and T. Braun, "A Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks," Proc. IEEE INFOCOM, pp. 1863-1874, 2005. (Pubitemid 41390699)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1863-1874
-
-
De Oliveira, R.1
Braun, T.2
-
30
-
-
75349114935
-
Harnessing exposed terminals in wireless networks
-
M. Vutukuru, K. Jamieson, and H. Balakrishnan, "Harnessing Exposed Terminals in Wireless Networks," Proc. USENIX Symp. Networked Systems Design and Implementation (NSDI '08), pp. 59-72, 2008.
-
(2008)
Proc. USENIX Symp. Networked Systems Design and Implementation (NSDI '08)
, pp. 59-72
-
-
Vutukuru, M.1
Jamieson, K.2
Balakrishnan, H.3
-
32
-
-
79959502121
-
-
http://www.xbow.com/products/Product-pdf-files/-Wireless-pdf/ MICA2-Datasheet.pdf, 2011.
-
(2011)
-
-
-
34
-
-
0036949025
-
A two-tier data dissemination model for large-scale wireless sensor network
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Network," Proc. Eighth ACM Ann. Conf. Mobile Computing and Networking, pp. 148-159, 2002.
-
(2002)
Proc. Eighth ACM Ann. Conf. Mobile Computing and Networking
, pp. 148-159
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
35
-
-
33748974964
-
FireWxNet: A multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments
-
MobiSys 2006 - Fourth International Conference on Mobile Systems, Applications and Services
-
C. Hartung, R. Han, C. Seielstad, and S. Holbrook, "FireWxNet: A Multi-Tiered Portable Wireless System for Monitoring Weather Conditions in Wildland Fire Environments," Proc. ACM MobiSys, pp. 28-41, 2006. (Pubitemid 44440786)
-
(2006)
MobiSys 2006 - Fourth International Conference on Mobile Systems, Applications and Services
, vol.2006
, pp. 28-41
-
-
Hartung, C.1
Han, R.2
Seielstad, C.3
Holbrook, S.4
-
36
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
Univ. of Colorado, Jan.
-
C. Hartung, J. Balasalle, and R. Han, "Node Compromise in Sensor Networks: The Need for Secure Systems," Technical Report CU-CS-990-05, Dept. of Computer Science, Univ. of Colorado, Jan. 2005.
-
(2005)
Technical Report CU-CS-990-05, Dept. of Computer Science
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
37
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
10.1145/1362542.1362546, May
-
S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 3, pp. 1-37, http://doi.acm.org/10.1145/1362542.1362546, May 2008.
-
(2008)
ACM Trans. Sensor Networks
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
39
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
|