1 |
Yih-ChunHu, "Wormhole Attack in Wireless Networks," IEE EJournal, Communication, Vol.24, No.2, pp. 370-380, Feb. 2006
|
2 |
Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Packet Leashes : A Defense against Wormhole Attacks in Wireless AdHoc Networks," In Proceedings of IEEE INFOCOM 2003, pp.1976-1986, April 2003
|
3 |
Adrian Perrig, Ran Canetti, J. D. Tygar, andDawn Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," Security and Privacy 2000 IEEE, pp.56-73, May 2000
|
4 |
R. L. Rivest, "Amethod for obtaining digital signature and public-key cryptosystems," Communication of the ACM, Vol.21, No.2, pp.120-126, Feb. 1978
DOI
ScienceOn
|
5 |
Intae Kim, Seungjin Han and Junghyun Lee, "Wormhole Detection using Multipath in Sensor Network," KSCI review, Vol.15, No.1, pp.77-81, 2007
|
6 |
Issa Khalil, Saurabh Bagehi and Nesss B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," In Proceedings of the International Conference on Dependable Systemand Networks, pp.612-621, 2005
|
7 |
A. VANI and D. Sreenivasa Rao, "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks," IJCSE, Vol.3, No.6, pp. 2377-2384, June 2011
|
8 |
Khin Sandar Win, "Analysis of Detecting Wormhole Attack in Wireless Networks," World Academy of Science, Engineering andTechnology 48, pp.422-423, 2008
|
9 |
Jun Jie Piao and TaeMu Chang, "Transmission Power Based Source Routing Protocol for Mobile Ad Hoc Networks with Unidirectional Links," ICHIT 2011, LNCS Vol.6935, pp. 146-153, Sept. 2011
|
10 |
Rakesh Babu Bobba, Laurent Eschenauer, Virgil Gligor and William Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks." Technical Report TR 2002-44, University of Maryland, May 2002
|
11 |
The Network Simulator NS-2, http://www.isi.edu/ nsnam/ns/
|
12 |
Nam: Network Animator, http://www.is.edu/nsnam/ nam
|