ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
Proceedings of the International Conference on Security and Cryptography
◽
10.5220/0002178400690074
◽
2009
◽
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks
2008 International Conference on Information Security and Assurance (isa 2008)
◽
10.1109/isa.2008.44
◽
2008
◽
Cited By ~ 14
Author(s):
Gunhee Lee
◽
Jungtaek Seo
◽
Dong-kyoo Kim
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007)
◽
10.1109/compsac.2007.63
◽
2007
◽
Cited By ~ 31
Author(s):
Xia Wang
◽
Johnny Wong
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
End To End
◽
Hoc Networks
Start Chat
Download Full-text
Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
2009 Fourth International Conference on Systems and Networks Communications
◽
10.1109/icsnc.2009.116
◽
2009
◽
Cited By ~ 8
Author(s):
Marianne A. Azer
◽
Sherif M. El-Kassas
◽
Magdy S. El-Soudani
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
NIS02-1: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
IEEE Globecom 2006
◽
10.1109/glocom.2006.267
◽
2006
◽
Cited By ~ 8
Author(s):
Majid Khabbazian
◽
Hugues Mercier
◽
Vijay K. Bhargava
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Networks Analysis
◽
Hoc Networks
Start Chat
Download Full-text
Notice of Violation of IEEE Publication Principles: A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks
2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
◽
10.1109/act.2009.141
◽
2009
◽
Cited By ~ 12
Author(s):
Mohit Jain
◽
Himanshu Kandwal
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Wormhole attack detection based on distance verification and the Use of hypothesis testing for wireless ad hoc networks
MILCOM 2009 - 2009 IEEE Military Communications Conference
◽
10.1109/milcom.2009.5379870
◽
2009
◽
Cited By ~ 4
Author(s):
Yifeng Zhou
◽
Louise Lamont
◽
Li Li
Keyword(s):
Ad Hoc Networks
◽
Hypothesis Testing
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
◽
10.1109/twc.2009.070536
◽
2009
◽
Vol 8
(2)
◽
pp. 736-745
◽
Cited By ~ 57
Author(s):
Majid Khabbazian
◽
Hugues Mercier
◽
Vijay K. Bhargava
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment
Cluster Computing
◽
10.1007/s10586-018-1825-8
◽
2018
◽
Vol 22
(S1)
◽
pp. 299-310
◽
Cited By ~ 2
Author(s):
S. Jagadeesan
◽
V. Parthasarathy
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Cross Layer
◽
Cloud Environment
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
Wireless Networks
◽
10.1007/s11276-006-3723-x
◽
2006
◽
Vol 13
(1)
◽
pp. 27-59
◽
Cited By ~ 123
Author(s):
Radha Poovendran
◽
Loukas Lazos
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Graph Theoretic
◽
Hoc Networks
Start Chat
Download Full-text
Wormhole Attack in Wireless Ad-Hoc Networks
International Journal of Computer Theory and Engineering
◽
10.7763/ijcte.2012.v4.457
◽
2012
◽
pp. 229-233
Author(s):
Yahya Ghanbarzadeh
◽
Ahmad Heidari
◽
Jaber Karimpour
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close