ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks
Mapping Intimacies
◽
10.1109/securware.2008.36
◽
2008
◽
Cited By ~ 5
Author(s):
Sandhya Khurana
◽
Neelima Gupta
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
End To End
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks
2008 The Fourth International Conference on Wireless and Mobile Communications
◽
10.1109/icwmc.2008.49
◽
2008
◽
Cited By ~ 4
Author(s):
Neelima Gupta
◽
Sandhya Khurana
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
End To End
◽
Hoc Networks
Download Full-text
End-to-end protocol to secure ad hoc networks against wormhole attacks
Security and Communication Networks
◽
10.1002/sec.272
◽
2011
◽
Vol 4
(9)
◽
pp. 994-1002
◽
Cited By ~ 4
Author(s):
Sandhya Khurana
◽
Neelima Gupta
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
End To End
◽
Hoc Networks
Download Full-text
QMCP: QoS Aware Multi-Channel Path Discovery for End to End Data Transmission Over Cognitive Radio Ad Hoc Networks
International Review on Computers and Software (IRECOS)
◽
10.15866/irecos.v11i12.10978
◽
2016
◽
Vol 11
(12)
◽
pp. 1054
Author(s):
Nagul Shribala
◽
P. Srihari
◽
B. C. Jinaga
Keyword(s):
Cognitive Radio
◽
Ad Hoc Networks
◽
Data Transmission
◽
Ad Hoc
◽
Path Discovery
◽
End To End
◽
Hoc Networks
Download Full-text
Estimation and application of end-to-end delay under unsaturation traffic in wireless ad hoc networks
IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems
◽
10.1049/cp:20051584
◽
2005
◽
Cited By ~ 2
Author(s):
Dong Linfang
◽
Shu Yantai
◽
Chen Haiming
◽
M. Maode
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
End To End Delay
◽
End To End
◽
Hoc Networks
Download Full-text
QoS-aware TDMA for end-to-end traffic scheduling in ad hoc networks
IEEE Wireless Communications
◽
10.1109/wc-m.2006.250361
◽
2006
◽
Vol 13
(5)
◽
pp. 68-74
◽
Cited By ~ 25
Author(s):
Dimitrios Vergados
◽
Dimitrios Vergados
◽
Christos Douligeris
◽
Spyridon Tombros
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Traffic Scheduling
◽
End To End
◽
Hoc Networks
Download Full-text
Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path
IEEE Wireless Communications and Networking Conference, 2005
◽
10.1109/wcnc.2005.1424843
◽
2005
◽
Cited By ~ 14
Author(s):
Lijun Qian
◽
Ning Song
◽
Xiangfang Li
Keyword(s):
Statistical Analysis
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Towards Absolute End-to-End QoS in Ad Hoc Networks
Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06)
◽
10.1109/aict-iciw.2006.195
◽
2006
◽
Cited By ~ 6
Author(s):
O. Salem
◽
A. Benzekri
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
End To End
◽
Hoc Networks
Download Full-text
Preventing Layer-3 wormhole attacks in ad-hoc networks with multipath DSR
2009 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop
◽
10.1109/medhocnet.2009.5205196
◽
2009
◽
Cited By ~ 6
Author(s):
Luis Fernando Garcia
◽
Jean-Marc Robert
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures
Computer Networks
◽
10.1016/j.comnet.2019.01.008
◽
2019
◽
Vol 150
◽
pp. 190-200
◽
Cited By ~ 4
Author(s):
Sen Bai
◽
Yunhao Liu
◽
Zhenhua Li
◽
Xin Bai
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Emulating End-to-End Losses and Delays for Ad Hoc Networks
2007 IEEE International Conference on Communications
◽
10.1109/icc.2007.535
◽
2007
◽
Cited By ~ 5
Author(s):
A. Seddik-Ghaleb
◽
Y. Ghamri-Doudane
◽
S.-M. Senouci
Keyword(s):
Ad Hoc Networks
◽
Ad Hoc
◽
End To End
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close