Author:
Bagade Sudhir,Raisinghani Vijay
Publisher
Springer International Publishing
Reference22 articles.
1. Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad-hoc routing protocols. IEEE Commun. Surv. Tutorials 10(4), 78–93 (2008). Fourth quarter
2. Su, X., Boppana, R.V.: On Mitigating in-band wormhole attacks in mobile ad-hoc networks. In: ICC Proceedings (2007)
3. Shi, F., Jin, D., Liu, W., Song, J.: Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks, IEEE TrustCom (2011)
4. Clausen, et al.: Jitter Considerations in Mobile Ad Hoc Networks (MANETs). IETF, RFC 5148 (2008)
5. Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad-hoc networks. IEEE Commun. Mag. 46, 127–133 (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献