Author:
Jyothirmai Pondi,Raj Jennifer. S.,Smys S.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference16 articles.
1. Wu, B., Chen, J., Wu, J., & Cardei, M. (2006). A survey on attacks and countermeasures in mobile adhoc networks. In Y. Xiao, X. Shen & D.-Z. Du (Eds.), Wireless/mobile network security (pp. 1–38). Berlin: Springer.
2. Supriya, K. M. (2012). Mobile Ad Hoc netwoks security attacks and secured routing protocols: A survey. In: N. Meghanathan, N. Chaki & D. Nagamalai (Eds.), Advances in computer science and information technology. Networks and communications. CCSIT 2012. Lecture notes of the institute for computer sciences, Social informatics and telecommunications engineering (Vol. 84, pp. 119–124). Berlin: Springer.
3. Liang, Y., Poor, H. V., & Ying, L. (2011). Secrecy throughput of MANETs under passive and active attacks. IEEE Transactions On Information Theory, 57(10), 6692–6702.
4. Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]. IEEE Wireless Communications, 17(5), 36–42.
5. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380.
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献