-
2
-
-
84893081505
-
-
Global mobile information systems simulation library (GloMoSim), [Aug. 15, 2012].
-
Global mobile information systems simulation library (GloMoSim), 2012. http://pcl.cs.ucla.edu/projects/glomosim/ [Aug. 15, 2012].
-
(2012)
-
-
-
4
-
-
38549088052
-
-
Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proc. of the IEEE International Conference on Communications, Vol. 07, June 24-28
-
Nasser N, Yunfeng C. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proc. of the IEEE International Conference on Communications, Vol. 07, June 24-28, 2007; 1154-1159.
-
(2007)
, pp. 1154-1159
-
-
Nasser, N.1
Yunfeng, C.2
-
5
-
-
70449436623
-
Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks
-
Gonzalez OF, Ansa G, Howarth M, Pavlou G. Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. Journal of Internet Engineering 2008; 2(1):181-192.
-
(2008)
Journal of Internet Engineering
, vol.2
, Issue.1
, pp. 181-192
-
-
Gonzalez, O.F.1
Ansa, G.2
Howarth, M.3
Pavlou, G.4
-
6
-
-
50949092585
-
-
WAP: wormhole attack prevention algorithm in mobile ad hoc networks. In Proc. of the International Conference on Sensor Networks, Ubiquitous & Trustworthy Computing, SUTC'08), Taichung, Taiwan, June 11-13
-
Choi S, Kim D-Y, Lee D-H, Jung J-I. WAP: wormhole attack prevention algorithm in mobile ad hoc networks. In Proc. of the International Conference on Sensor Networks, Ubiquitous & Trustworthy Computing, (SUTC'08), Taichung, Taiwan, June 11-13, 2008; 343-348.
-
(2008)
, pp. 343-348
-
-
Choi, S.1
Kim, D.-Y.2
Lee, D.-H.3
Jung, J.-I.4
-
8
-
-
59649116337
-
A secure routing protocol against byzantine attacks for MANETs in adversarial environments
-
Yu M, Zhou M, Su W. A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology 2009; 58(1):449-460.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.1
, pp. 449-460
-
-
Yu, M.1
Zhou, M.2
Su, W.3
-
9
-
-
80052176023
-
-
Side channel monitoring: packet drop attack detection in wireless ad hoc networks. In Proc. of the IEEE Intl. Conference on Communications (ICC'11), Kyoto, Japan, June 5-9
-
Li X, Lu R, Liang X, Shen X. Side channel monitoring: packet drop attack detection in wireless ad hoc networks. In Proc. of the IEEE Intl. Conference on Communications (ICC'11), Kyoto, Japan, June 5-9, 2011.
-
(2011)
-
-
Li, X.1
Lu, R.2
Liang, X.3
Shen, X.4
-
10
-
-
84864195717
-
Advanced algorithm for detection and prevention of cooperative black and grayhole attacks in mobile ad hoc networks
-
Jain S, Jain M, Kandwal H. Advanced algorithm for detection and prevention of cooperative black and grayhole attacks in mobile ad hoc networks. International Journal of Computers and Applications 2010; 1(7):37-42.
-
(2010)
International Journal of Computers and Applications
, vol.1
, Issue.7
, pp. 37-42
-
-
Jain, S.1
Jain, M.2
Kandwal, H.3
-
11
-
-
84860761299
-
-
E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In Proc. of the 8th Intl. Workshop on Heterogeneous Wireless Networks (HWISE'12), held in conjunction with AINA 2012, Fukuoka, Japan, March 26-29
-
Dhurandher SK, Woungang I, Gupta A, Bhargava B. E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In Proc. of the 8th Intl. Workshop on Heterogeneous Wireless Networks (HWISE'12), held in conjunction with AINA 2012, Fukuoka, Japan, March 26-29, 2012.
-
(2012)
-
-
Dhurandher, S.K.1
Woungang, I.2
Gupta, A.3
Bhargava, B.4
-
12
-
-
84863178488
-
-
Message security in multipath ad hoc networks using a neural network-based cipher. In Proc. of the IEEE GLOBECOM 2011, Houston, Texas, USA, Dec. 5-9
-
Liu C, Woungang I, Chao H-C, Dhurandher SK, Chi T-Y, Obaidat MS. Message security in multipath ad hoc networks using a neural network-based cipher. In Proc. of the IEEE GLOBECOM 2011, Houston, Texas, USA, Dec. 5-9, 2011.
-
(2011)
-
-
Liu, C.1
Woungang, I.2
Chao, H.-C.3
Dhurandher, S.K.4
Chi, T.-Y.5
Obaidat, M.S.6
-
13
-
-
0041973497
-
-
Packet leashes: a defence against wormhole attacks in wireless networks. In Proc. of INFOCOM 2003, Vol. 3
-
Hu Y, Perrig A, Johnson D. Packet leashes: a defence against wormhole attacks in wireless networks. In Proc. of INFOCOM 2003, Vol. 3, 2003; 1976-1986.
-
(2003)
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
14
-
-
46149096001
-
-
TrueLink: a practical countermeasure to the wormhole attack in wireless networks. In Proc. of 14th Intl. Conference on Network Protocols (ICNP'06), Santa Barbara, CA, USA, Nov. 12-15
-
Eriksson J, Krishnamurthy SV, Faloutsos M. TrueLink: a practical countermeasure to the wormhole attack in wireless networks. In Proc. of 14th Intl. Conference on Network Protocols (ICNP'06), Santa Barbara, CA, USA, Nov. 12-15, 2006; 75-84.
-
(2006)
, pp. 75-84
-
-
Eriksson, J.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
16
-
-
34548321774
-
-
Detecting wormhole attacks in wireless networks using conectivity information. In Proc. of 26th IEEE INFOCOM'07, Anchorage, Alaska, USA, May 6-12
-
Maheshwari R, Gao J, Das SR. Detecting wormhole attacks in wireless networks using conectivity information. In Proc. of 26th IEEE INFOCOM'07, Anchorage, Alaska, USA, May 6-12, 2007; 107-115.
-
(2007)
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
17
-
-
84864257708
-
-
Preventing packet dropping and message tampering attacks on aodv-based mobile ad hoc networks. In Press, Proc. of the Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2012), Amman, Jordan, May 13-16
-
Obaidat MS, Woungang I, Dhurandher SK, Koo V. Preventing packet dropping and message tampering attacks on aodv-based mobile ad hoc networks. In Press, Proc. of the Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2012), Amman, Jordan, May 13-16, 2012.
-
(2012)
-
-
Obaidat, M.S.1
Woungang, I.2
Dhurandher, S.K.3
Koo, V.4
-
18
-
-
77949289802
-
-
Timing evaluation of the known cryptographic algorithms. In Proc. of the Intl. Conference on Computational Intelligence and Security (CIS '09), Beijing, China, Dec. 11-14
-
Wang Y, Hu M. Timing evaluation of the known cryptographic algorithms. In Proc. of the Intl. Conference on Computational Intelligence and Security (CIS '09), Beijing, China, Dec. 11-14, 2009; 233-237.
-
(2009)
, pp. 233-237
-
-
Wang, Y.1
Hu, M.2
|