Author:
Singh Asmita,Sah Atul Kumar,Singh Arun,Jaint Bhavnesh,Indu S.
Reference9 articles.
1. Chiu HS, Lui KS (2006) DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st international symposium on wireless pervasive computing. IEEE Press, Phuket, Thailand, pp 6
2. Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst 2016:1–13
3. Kim M, Médard M, Barros J (2011) Algebraic watchdog: mitigating misbehavior in wireless network coding. IEEE J Select Areas Commun 29(10):1916–1925
4. Ji S, Chen T, Zhong S (2015) Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans Mob Comput 14(3):660–674
5. Tsitsiroudi N, Sarigiannidis P, Karapistoli E, Economides AA (2016) EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: 9th IFIP wireless and mobile networking conference (WMNC), Colmar, pp 103–109
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献