ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
◽
10.1109/trustcom.2011.240
◽
2011
◽
Cited By ~ 3
Author(s):
Fei Shi
◽
Dongxu Jin
◽
Weijie Liu
◽
JooSeok Song
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path
IEEE Wireless Communications and Networking Conference, 2005
◽
10.1109/wcnc.2005.1424843
◽
2005
◽
Cited By ~ 14
Author(s):
Lijun Qian
◽
Ning Song
◽
Xiangfang Li
Keyword(s):
Statistical Analysis
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures
Computer Networks
◽
10.1016/j.comnet.2019.01.008
◽
2019
◽
Vol 150
◽
pp. 190-200
◽
Cited By ~ 4
Author(s):
Sen Bai
◽
Yunhao Liu
◽
Zhenhua Li
◽
Xin Bai
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Detecting Wormhole Attacks on Wireless Ad-hoc Networks: A Group based Approach
International Journal of Computer Applications
◽
10.5120/12246-8299
◽
2013
◽
Vol 69
(28)
◽
pp. 8-13
Author(s):
Nagendra Kumar
◽
Nagendra Kr. Mishra
◽
Shubham Omar
◽
Sandeep Saxena
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2005.07.003
◽
2007
◽
Vol 30
(1)
◽
pp. 308-330
◽
Cited By ~ 31
Author(s):
Lijun Qian
◽
Ning Song
◽
Xiangfang Li
Keyword(s):
Statistical Analysis
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Analysis Approach
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
19th IEEE International Parallel and Distributed Processing Symposium
◽
10.1109/ipdps.2005.471
◽
2005
◽
Cited By ~ 40
Author(s):
Ning Song
◽
Lijun Qian
◽
Xiangfang Li
Keyword(s):
Statistical Analysis
◽
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Analysis Approach
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks
2012 26th International Conference on Advanced Information Networking and Applications Workshops
◽
10.1109/waina.2012.85
◽
2012
◽
Cited By ~ 10
Author(s):
Sanjay Kumar Dhurandher
◽
Isaac Woungang
◽
Abhishek Gupta
◽
Bharat K. Bhargava
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Energy Efficient
◽
Ad Hoc
◽
Wormhole Attacks
◽
Efficient Scheme
◽
Hoc Networks
Download Full-text
Detecting and avoiding wormhole attacks in wireless ad hoc networks
IEEE Communications Magazine
◽
10.1109/mcom.2008.4481351
◽
2008
◽
Vol 46
(4)
◽
pp. 127-133
◽
Cited By ~ 49
Author(s):
Farid Nait-Abdesselam
◽
Brahim Bensaou
◽
Tarik Taleb
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
Wireless Algorithms, Systems, and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88582-5_46
◽
2008
◽
pp. 491-502
◽
Cited By ~ 6
Author(s):
Hai Vu
◽
Ajay Kulkarni
◽
Kamil Sarac
◽
Neeraj Mittal
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Wormhole Attacks
◽
Hoc Networks
◽
New Framework
Download Full-text
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
IEEE Wireless Communications and Networking Conference, 2005
◽
10.1109/wcnc.2005.1424678
◽
2005
◽
Cited By ~ 51
Author(s):
L. Lazos
◽
R. Poovendran
◽
C. Meadows
◽
P. Syverson
◽
L.W. Chang
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
Theoretic Approach
◽
Graph Theoretic
◽
Wormhole Attacks
◽
Graph Theoretic Approach
◽
Hoc Networks
Download Full-text
New approach for detection and defending the wormhole attacks in Wireless ad hoc networks
2010 18th Iranian Conference on Electrical Engineering
◽
10.1109/iraniancee.2010.5507050
◽
2010
◽
Cited By ~ 6
Author(s):
Mahdi Taheri
◽
Majid Naderi
◽
Mohammad Bagher Barekatain
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Ad Hoc
◽
New Approach
◽
Wormhole Attacks
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close