-
1
-
-
85029731561
-
A survey on attacks and countermeasures in mobile ad hoc networks
-
Springer Book
-
B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey on attacks and countermeasures in mobile ad hoc networks,” Wireless Network Security, Springer Book, ISBN: 978-0-387-28040-0, pp. 103–135, 2007.
-
(2007)
Wireless Network Security
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
3
-
-
0003938947
-
-
J. editors, October network Working Group. Online.
-
T. Clausen, P. J. (editors), C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, and L.Viennot, “Optimized link state routing protocol (OLSR),” pp. 1–75, October 2003, network Working Group. [Online]. Available: http://ietf.org/rfc/rfc3626.txt
-
(2003)
Optimized Link State Routing Protocol (OLSR)
, pp. 1-75
-
-
Clausen, T.1
Adjih, C.2
Laouiti, A.3
Minet, P.4
Muhlethaler, P.5
Qayyum, A.6
Viennot, L.7
-
5
-
-
37349060385
-
Detecting and evading wormholes in mobile ad-hoc wireless networks
-
11
-
A. A. Pirzada and C. McDonald, “Detecting and evading wormholes in mobile ad-hoc wireless networks,” International Journal of Network Security, no. 2, pp. 191–202, 11 2005.
-
(2005)
International Journal of Network Security
, Issue.2
, pp. 191-202
-
-
Pirzada, A.A.1
McDonald, C.2
-
8
-
-
42649100347
-
Detecting and avoiding wormhole attacks in wireless ad hoc networks
-
April
-
F. Nait-Abdesselam, B. Bensaou, and T. Taleb, “Detecting and avoiding wormhole attacks in wireless ad hoc networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 127–133, April 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 127-133
-
-
Nait-Abdesselam, F.1
Bensaou, B.2
Taleb, T.3
-
10
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information,” 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 107–115, 2007.
-
(2007)
26th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
11
-
-
0041973497
-
-
March-3 April
-
Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” vol. 3, March-3 April 2003, pp. 1976–1986.
-
(2003)
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks
, vol.3
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
13
-
-
76349114478
-
An obstacle-aware human mobility model for ad hoc networks
-
September
-
C. Papageorgiou, K. Birkos, T. Dagiuklas, and S. Kotsopoulos, “An obstacle-aware human mobility model for ad hoc networks,” 17th IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), September, 2009.
-
(2009)
17th IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Papageorgiou, C.1
Birkos, K.2
Dagiuklas, T.3
Kotsopoulos, S.4
-
14
-
-
85068231435
-
-
Online.
-
[Online]. Available: http://www.wltl.ee.upatras.gr/humo/
-
-
-
-
16
-
-
12744258116
-
Providing unified security mechanisms for manet network layer
-
C. Chigan, L. Li, and R. Bandaru, “Providing unified security mechanisms for manet network layer,” International Conference on Wireless Networks, pp. 721–726, 2004.
-
(2004)
International Conference on Wireless Networks
, pp. 721-726
-
-
Chigan, C.1
Li, L.2
Bandaru, R.3
|