78 Akyildiz, I. F., et al. ... networks 47(4): 445-487.

advertisement
78
REFERENCES
Akyildiz, I. F., et al. (2005). "Wireless mesh networks: a survey." Computer
networks 47(4): 445-487.
Altman, E. and T. Jimenez (2003). "NS Simulator for beginners." Lecture notes.
Univ. de Los Andes, Merida, Venezuela and ESSI. Sophia-Antipolis, France.
Awerbuch, B., et al. (2008). "ODSBR: An on-demand secure Byzantine resilient
routing protocol for wireless ad hoc networks." ACM Transactions on
Information and System Security (TISSEC) 10(4): 6.
Awerbuch, B., et al. (2002). An on-demand secure routing protocol resilient to
byzantine failures. Proceedings of the 1st ACM workshop on Wireless security,
ACM.
Baras, J. S., et al. (2007). Intrusion detection system resiliency to byzantine attacks:
The case study of wormholes in OLSR. Military Communications Conference,
2007. MILCOM 2007. IEEE, IEEE.
Biswas, K. and M. L. Ali (2007). "Security threats in mobile ad hoc network."
Department of Interaction and System Design School of Engineering,
march2007: 9-26.
Cayirci, E. and C. Rong (2008). Security in wireless ad hoc and sensor networks,
Wiley.
Chiu, H. S. and K.-S. Lui (2006). DelPHI: wormhole detection mechanism for ad hoc
wireless networks. Wireless Pervasive Computing, 2006 1st International
Symposium on, IEEE.
Choi, S., et al. (2008). WAP: Wormhole attack prevention algorithm in mobile ad
hoc networks. Sensor Networks, Ubiquitous and Trustworthy Computing, 2008.
SUTC'08. IEEE International Conference on, IEEE.
Dananjayan, P., et al. "Energy Efficient and Secured Cluster Based Routing Protocol
for Wireless Sensor Networks."
79
Das, R., et al. (2012). "Security Measures for Black Hole Attack in MANET: An
Approach." arXiv preprint arXiv:1206.3764.
Deng, H., et al. (2002). "Routing security in wireless ad hoc networks."
Communications Magazine, IEEE 40(10): 70-75.
Djenouri, D., et al. (2005). "A survey of security issues in mobile ad hoc networks."
IEEE communications surveys 7(4).
Giordano, S. (2002). "Mobile ad hoc networks." Handbook of wireless networks and
mobile computing: 325-346.
Gorlatova, M. A., et al. (2006). Detecting wormhole attacks in mobile ad hoc
networks through protocol breaking and packet timing analysis. Military
Communications Conference, 2006. MILCOM 2006. IEEE, IEEE.
Hartenstein, H. and K. P. Laberteaux (2008). "A tutorial survey on vehicular ad hoc
networks." Communications Magazine, IEEE 46(6): 164-171.
Hu, L. and D. Evans (2004). Using directional antennas to prevent wormhole attacks.
Network and Distributed System Security Symposium (NDSS), San Diego.
Hu, Y.-C., et al. (2003). "SEAD: Secure efficient distance vector routing for mobile
wireless ad hoc networks." Ad hoc networks 1(1): 175-192.
Hu, Y.-C., et al. (2003). Packet leashes: a defense against wormhole attacks in
wireless networks. INFOCOM 2003. Twenty-Second Annual Joint Conference
of the IEEE Computer and Communications. IEEE Societies, IEEE.
Hu, Y.-C., et al. (2005). "Ariadne: A secure on-demand routing protocol for ad hoc
networks." Wireless Networks 11(1-2): 21-38.
Ilyas, M. (2010). The handbook of ad hoc wireless networks, CRC press.
Jain, S. and S. Jain (2010). "Detection and prevention of wormhole attack in mobile
adhoc networks." networks 1793: 8201.
Jen, S.-M., et al. (2009). "A Hop-Count Analysis Scheme for Avoiding Wormhole
Attacks in MANET." Sensors 9(6): 5022-5039.
Kannhavong, B., et al. (2007). "A survey of routing attacks in mobile ad hoc
networks." Wireless Communications, IEEE 14(5): 85-91.
Karlof, C. and D. Wagner (2003). "Secure routing in wireless sensor networks:
Attacks and countermeasures." Ad hoc networks 1(2): 293-315.
Khalil, I., et al. (2005). LITEWORP: a lightweight countermeasure for the wormhole
attack in multihop wireless networks. Dependable Systems and Networks, 2005.
DSN 2005. Proceedings. International Conference on, IEEE.
80
Khalil, I., et al. (2008). "MOBIWORP: Mitigation of the wormhole attack in mobile
multihop wireless networks." Ad hoc networks 6(3): 344-362.
Marti, S., et al. (2000). Mitigating routing misbehavior in mobile ad hoc networks.
International Conference on Mobile Computing and Networking: Proceedings of
the 6 th annual international conference on Mobile computing and networking.
Naït-Abdesselam, F. (2008). "Detecting and avoiding wormhole attacks in wireless
ad hoc networks." Communications Magazine, IEEE 46(4): 127-133.
Ngadi, M., et al. (2008). "A review current routing attacks in mobile ad-hoc
networks." International Journal of Computer Science and Security 2(3): 18-29.
Papadimitratos, P. and Z. J. Haas (2002). Secure routing for mobile ad hoc networks.
Proceedings of the SCS Commnication Networks and Distributed Systems
Modeling and Simulation Conference (CNDS).
Roy, D. B., et al. (2010). "A new cluster-based wormhole intrusion detection
algorithm for mobile ad-hoc networks." arXiv preprint arXiv:1004.0587.
Sanzgiri, K., et al. (2002). A secure routing protocol for ad hoc networks. Network
Protocols, 2002. Proceedings. 10th IEEE International Conference on, IEEE.
Slijepcevic, S., et al. (2002). On communication security in wireless ad-hoc sensor
networks. Enabling Technologies: Infrastructure for Collaborative Enterprises,
2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on,
IEEE.
Sookhak, M., et al. (2011). "Detection Wormhole in Wireless Ad-hoc Networks."
International Journal of Computer Science and telecommunication 2(7): 7.
Vivian, D., et al. (2006). Evaluation of QoS Metrics in Ad Hoc Networks with the
use of Secure Routing Protocols. Network Operations and Management
Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, IEEE.
Wang, X. and J. Wong (2007). An end-to-end detection of wormhole attack in
wireless ad-hoc networks. Computer Software and Applications Conference,
2007. COMPSAC 2007. 31st Annual International, IEEE.
Wu, B., et al. (2007). A survey of attacks and countermeasures in mobile ad hoc
networks. Wireless Network Security, Springer: 103-135.
Yang, H., et al. (2004). "Security in mobile ad hoc networks: challenges and
solutions." Wireless Communications, IEEE 11(1): 38-47.
Download