-
1
-
-
50149105732
-
Impact of Denial of Service Attacks on Ad Hoc Networks
-
I. Aad, J.-P. Hubaux, and E.W. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks". IEEE Trans. on Networking, 16(4):791-802, 2008.
-
(2008)
IEEE Trans. on Networking
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
2
-
-
84891584375
-
-
Wiley-IEEE Press
-
S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile Ad Hoc Networking, Wiley-IEEE Press, 2004.
-
(2004)
Mobile Ad Hoc Networking
-
-
Basagni, S.1
Conti, M.2
Giordano, S.3
Stojmenovic, I.4
-
3
-
-
33845666617
-
Inner-circle consistency for wireless ad hoc networks
-
DOI 10.1109/TMC.2007.250670
-
C. Basile, Z. Kalbarczyk, and R.K. Lyer, "Inner-circle consistency for wireless ad hoc networks". IEEE Trans. on Mobile Computing, 6(1):39-55, 2007. (Pubitemid 44955813)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 39-55
-
-
Basile, C.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
4
-
-
77954342948
-
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
-
J. Cai, P. Yi, J. Chen, Z. Wang, and N. Liu, "An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network". In Proc. of IEEE AINA, 2010.
-
(2010)
Proc. of IEEE AINA
-
-
Cai, J.1
Yi, P.2
Chen, J.3
Wang, Z.4
Liu, N.5
-
5
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
DOI 10.1109/MCOM.2002.1039859
-
H. Deng, W. Li, and D.P. Agrawal, "Routing security in wireless ad hoc networks". IEEE Communications Magazine, 40(10):70-75, 2002. (Pubitemid 35311948)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
6
-
-
70349161605
-
REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits
-
W. Kozma Jr. and L. Lazos, "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits". In Proc. of ACM WiSec, pp. 103-110, 2009.
-
(2009)
Proc. of ACM WiSec
, pp. 103-110
-
-
Kozma Jr., W.1
Lazos, L.2
-
7
-
-
34548048170
-
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
-
S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method". Int'l J. of Network Security, 5(3):338-346, 2007.
-
(2007)
Int'l J. of Network Security
, vol.5
, Issue.3
, pp. 338-346
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Jamalipour, A.4
Nemoto, Y.5
-
8
-
-
33947624156
-
An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs
-
K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, "An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs". IEEE Trans. on Mobile Computing, 6(5):536-550, 2007.
-
(2007)
IEEE Trans. on Mobile Computing
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.3
Balakrishnan, K.4
-
9
-
-
82555196697
-
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
-
to appear
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks". IEEE Trans. on Parallel and Distributed Systems, to appear.
-
IEEE Trans. on Parallel and Distributed Systems
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks". In Proc. of ACM MobiCom, 2000.
-
Proc. of ACM MobiCom, 2000
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
11
-
-
84944714533
-
Collaborative security architecture for blackhole attack prevention in mobile ad hoc networks
-
A. Patcha and A. Mishra, "Collaborative security architecture for blackhole attack prevention in mobile ad hoc networks". In Proc. of RAWCON, pp. 75-78, 2003.
-
(2003)
Proc. of RAWCON
, pp. 75-78
-
-
Patcha, A.1
Mishra, A.2
-
12
-
-
77952986444
-
Secure Data collection in wireless sensor networks using randomized dispersive routes
-
T. Shu, M. Krunz, and S. Liu, "Secure Data collection in wireless sensor networks using randomized dispersive routes". IEEE Trans. on Mobile Computing, 9(7):941-954, 2010.
-
(2010)
IEEE Trans. on Mobile Computing
, vol.9
, Issue.7
, pp. 941-954
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
14
-
-
51849165425
-
Detecting black-hole attack in mobile ad hoc networks
-
B. Sun, Y. Guan, J. Chen, and U.W. Pooch, "Detecting black-hole attack in mobile ad hoc networks". In Proc. of EPMCC, 2003.
-
Proc. of EPMCC, 2003
-
-
Sun, B.1
Guan, Y.2
Chen, J.3
Pooch, U.W.4
|