메뉴 건너뛰기




Volumn , Issue , 2012, Pages 472-477

E2SIW: An energy efficient scheme immune to wormhole attacks in wireless ad hoc networks

Author keywords

ad hoc networks; detection; energyefficiency; hidden node; malicious node; prevention; wormhole attacks

Indexed keywords

ALTERNATE ROUTES; ENERGY EFFICIENT; HIDDEN NODES; HIGH DETECTION RATE; LOCATION INFORMATION; MALICIOUS NODES; MULTIHOP WIRELESS AD HOC NETWORKS; PREVENTION; SECURITY THREATS; WORMHOLE ATTACK; WORMHOLE DETECTIONS;

EID: 84860761299     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2012.85     Document Type: Conference Paper
Times cited : (15)

References (11)
  • 2
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile Ad Hoc networks: Challenges and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, Vol. 11, pp. 38-47, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 3
    • 79961216933 scopus 로고    scopus 로고
    • Master Thesis, Computer Science, School of Computing, Blekinge Institute of Technology, Sweden, June
    • C. H. Vu, A. Soneye, "An Analysis Collaborative Attacks on Mobile Ad Networks" Master Thesis, Computer Science, School of Computing, Blekinge Institute of Technology, Sweden, June, 2009.
    • (2009) An Analysis Collaborative Attacks on Mobile Ad Networks
    • Vu, C.H.1    Soneye, A.2
  • 4
    • 61349151189 scopus 로고    scopus 로고
    • Severity analysis and countermeasures for the wormhole attack in wireless Ad Hoc networks
    • Feb.
    • M. Khabbazian, H. Mercier, V. K. Bhargava, "Severity Analysis and Countermeasures for the Wormhole Attack in Wireless Ad Hoc Networks" in IEEE Transactions on Wireless Communications, Vol. 8, No. 2, Feb. 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.2
    • Khabbazian, M.1    Mercier, H.2    Bhargava, V.K.3
  • 5
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • San Francisco, USA, Mar. 30 - April 3
    • Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. of IEEE INFOCOM 2003, San Francisco, USA, Mar. 30 - April 3, 2003.
    • (2003) Proc. of IEEE INFOCOM 2003
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 34447283779 scopus 로고    scopus 로고
    • Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
    • S. Khalil, S. Bagchi, N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Computer Networks, Vol. 51, No. 13, pp. 3750-3772, 2007.
    • (2007) Computer Networks , vol.51 , Issue.13 , pp. 3750-3772
    • Khalil, S.1    Bagchi, S.2    Shroff, N.B.3
  • 10
    • 84899740998 scopus 로고    scopus 로고
    • Visualization of wormholes in underwater sensor networks: A distributed approach
    • W. Wang, J. Kong, B. Bhargava, and M. Gerla, "Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach", Int. Journal of Security and Networks, Vol. 3, No. 1, 10-23, 2008.
    • (2008) Int. Journal of Security and Networks , vol.3 , Issue.1 , pp. 10-23
    • Wang, W.1    Kong, J.2    Bhargava, B.3    Gerla, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.