Acceso abierto

Detecting Wormhole Attacks In Wireless Sensor Networks Using Hop Count Analysis


Cite

J. Agre, L. Clare, “An integrated architecture for cooperative sensing networks”, IEEE Computer, Vol 33, No. 5, 2000, pp. 106-108.10.1109/2.841788Search in Google Scholar

D. Estrin, R. Govindan, J. Heideman and S. Kumar., “Next century challenges: Scalable Coordination in Sensor Networks”, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp.263-270, USA, 1999.10.1145/313451.313556Search in Google Scholar

Kewei Sha, Junzhao Du, Weisong Shi, “WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs”, International Journal of Sensor Networks, Vol 1, No. 3/4, 2006, pp.156-168.10.1504/IJSNET.2006.012031Search in Google Scholar

Habib M.Ammari, Sajal K. Das, “A trade-off between energy and delay in data dessemination for wireless sensor networks using transmision range slicing”, Computer Communications, Vol 31, No. 9, 2008, pp.1687-1704.10.1016/j.comcom.2007.11.006Search in Google Scholar

Karlof C, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, Vol 1, No. 2/3, 2003, pp. 293-315.10.1016/S1570-8705(03)00008-8Search in Google Scholar

Y.-C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976-1986, USA, March 30 - April 3, 2003.Search in Google Scholar

L.X. Hu and D Evans, “Using directional antennas to prevent wormhole attacks”, Proceedings of Network and Distributed System Security Symposium, USA, February 5-6, 2004.Search in Google Scholar

Perrig, Adrian, Trappe, Wade, Gligor, Virgil and Poovendran Radha, “Secure wireless networking” Journal of Communications and Networks, Vol 13, No. 1, 2007, pp. 323-327.10.1109/JCN.2009.6388406Search in Google Scholar

S. Choi and D.Y. Kim, D. H. Lee, J.I. Jung, “WAP: Wormhole attack prevention algorithm in mobile Ad Hoc networks”, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 3434-348, USA, June 11-13, 2008.Search in Google Scholar

S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.10.1016/j.adhoc.2008.09.005Search in Google Scholar

G. Lee, D. K. Kim, J. Seo, “An approach to mitigate wormhole attack in wireless Ad Hoc networks”, Proceedings of 2008 International Conference on Information Security and Assurance, pp. 220-225, Korea, April 24-26, 2009.Search in Google Scholar

J Zhu, KL Hung, B Bensaou, F Nait-Abdesselam, “Rate-lifetime tradeoff for reliable communication in wireless sensor networks”, Computer Networks, Vol. 52, No. 1, 2007, pp. 2543.10.1016/j.comnet.2007.09.011Search in Google Scholar

A. Rasheed and R. Mahapatra, “Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks”, Proceedings of the 28th IEEE International Performance Computing and Communications Conference, pp..216-222, USA, December 14-16, 2009.10.1109/PCCC.2009.5403840Search in Google Scholar

R. Maheshwari and J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 105-115, USA, May 6-12, 2007.10.1109/INFCOM.2007.21Search in Google Scholar

T. Hayajneh and P. Krishnamurthy, D. Tipper, “DeWorm: a simple protocol to detect wormhole attacks in wireless Ad hoc networks”, Proceedings of the Third International Conference on Network and System Security, pp. 73-80, Australia, October 19-21, 2009.10.1109/NSS.2009.85Search in Google Scholar

D. Z. Dong and M. Li, Y. H. Liu, X. Y. Li, X. K. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks”, IEEE/ACM Transactions on Networking, Vol 19, No. 6, 2011, pp. 1787-1796.10.1109/TNET.2011.2163730Search in Google Scholar

S. M. Jen and C. S. Laih, W. C. Kuo, “A hop-count analysis scheme for avoiding wormhole attacks in MANET”, Sensors, Vol 19, No. 6, 2009, pp. 5022-5039.10.3390/s90605022329195122408566Search in Google Scholar

L. J. Qian and N. Song, X. F. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach”, Journal of Network and Computer Applications, Vol 30, 2007, pp. 308-330.10.1016/j.jnca.2005.07.003Search in Google Scholar

A. Hatcher, “Algebraic topology”, Cambridge University Press, Cambridge, 2002.Search in Google Scholar

S. J. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in Ad hoc networks”, Proceedings of IEEE International Conference on Communications, pp. 3201-3205, Finland, June 11-14, 2001.Search in Google Scholar

eISSN:
1178-5608
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Engineering, Introductions and Overviews, other