Author:
Clulow Jolyon,Hancke Gerhard P.,Kuhn Markus G.,Moore Tyler
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Lecture Notes in Computer Science;S. Brands,1994
2. Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, Chichester (2005)
3. Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: MOBICOM, pp. 243–254 (2000)
4. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: INFOCOM (2003)
5. Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: [22], pp. 30–40 (2003)
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Contextual attribute‐based access control scheme for cloud storage using blockchain technology;Software: Practice and Experience;2023-08-09
2. LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations;Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services;2023-06-18
3. Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT;2022 IEEE 31st International Symposium on Industrial Electronics (ISIE);2022-06-01
4. Defining Secure Areas for TDOA-Enhanced Non-Ideal Distance Bounding;2022 International Wireless Communications and Mobile Computing (IWCMC);2022-05-30
5. Here, there, and everywhere;Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2021-06-28