Author:
Kaur Parvinder,Kaur Dalveer,Mahajan Rajiv
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference16 articles.
1. Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.
2. Corson, S., & Macker, J. (1998). Mobile ad hoc networking (MANETSS): Routing protocol performance issues and evaluation considerations (No. RFC 2501).
3. Naït-Abdesselam, F., Bensaou, B., & Taleb, T. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46(4), 127–133.
4. Khabbazian, M., Mercier, H., & Bhargava, V. K. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736–745.
5. Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6(4), 483–503.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献