Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Wormhole attack")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 13 of 13

  • Page / 1
Export

Selection :

  • and

Connectivity-Based Wormhole Detection in Ubiquitous Sensor NetworksDEZUN DONG; MO LI; YUNHAO LIU et al.Journal of information science and engineering. 2011, Vol 27, Num 1, pp 65-78, issn 1016-2364, 14 p.Article

A Group-Based Deployment for Wormhole Prevention in Sensor NetworksLAI, Gu-Hsin; OUYANG, Chen-Sen; CHEN, Chia-Mei et al.Journal of information science and engineering. 2011, Vol 27, Num 1, pp 79-93, issn 1016-2364, 15 p.Article

Visualisation of wormholes in underwater sensor networks : a distributed approachWEICHAO WANG; JIEJUN KONG; BHARGAVA, Bharat et al.International journal of security and networks (Print). 2008, Vol 3, Num 1, pp 10-23, issn 1747-8405, 14 p.Article

Defending against wormhole attacks in mobile ad hoc networksWEICHAO WANG; BHARGAVA, Bharat; YI LU et al.Wireless communications and mobile computing (Print). 2006, Vol 6, Num 4, pp 483-503, issn 1530-8669, 21 p.Article

Securing DSR against wormhole attacks in multirate ad hoc networksQAZI, Shams; RAAD, Raad; YI MU et al.Journal of network and computer applications. 2013, Vol 36, Num 2, pp 582-592, issn 1084-8045, 11 p.Article

Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless NetworksJANNATI, Hoda; FALAHATI, Abolfazl.Wireless personal communications. 2014, Vol 77, Num 1, pp 127-149, issn 0929-6212, 23 p.Article

LITEWORP : Detection and isolation of the wormhole attack in static multihop wireless networksKHALIL, Issa; BAGCHI, Saurabh; SHROFF, Ness B et al.Computer networks (1999). 2007, Vol 51, Num 13, pp 3750-3772, issn 1389-1286, 23 p.Article

Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc NetworksYUN, Ji-Hoon; PARK, Min-Ho.Wireless personal communications. 2013, Vol 72, Num 4, pp 2519-2532, issn 0929-6212, 14 p.Article

Eliminating rouge femtocells based on distance bounding protocol and geographic informationCHEN, Chien-Ming; CHEN, Yao-Hsin; LIN, Yue-Hsun et al.Expert systems with applications. 2014, Vol 41, Num 2, pp 426-433, issn 0957-4174, 8 p.Article

Detection of wormhole attacks in multi-path routed wireless ad hoc networks : A statistical analysis approachLIJUN QIAN; NING SONG; XIANGFANG LI et al.Journal of network and computer applications. 2007, Vol 30, Num 1, pp 308-330, issn 1084-8045, 23 p.Article

Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc NetworksKHABBAZIAN, Majid; MERCIER, Hugues; BHARGAVA, Vijay K et al.IEEE transactions on wireless communications. 2009, Vol 8, Num 2, pp 736-745, issn 1536-1276, 10 p.Article

Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc NetworksSU, Ming-Yang.International journal of ad hoc and ubiquitous computing (Print). 2011, Vol 7, Num 4, pp 246-260, issn 1743-8225, 15 p.Article

Mitigation of colluding route falsification attacks by insider nodes in mobile ad hoc networksXU SU; BOPPANA, Rajendra V.Wireless communications and mobile computing (Print). 2009, Vol 9, Num 8, pp 1141-1157, issn 1530-8669, 17 p.Article

  • Page / 1