Wormhole Detection Methods- A Survey
Abstract
Keywords
Full Text:
PDFReferences
Ming-Yang Su, “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,”Adhoc Networks ,2010
Hon Sun Chiu, King-Shan Lui, “DelPHI: Wormhole detection echanism for ad hoc wireless networks,” In the proceedings of the 1st international symposium on wireless pervasive computing, 2006.
Xu Su and Rajendra V. Boppana, “On mitigating in-band wormhole attacks in mobile ad hoc networks,” In the proceedings of the IEEE international conference on communications,pp. 1136–41,2007.
Ning Song, Lijun Qian, and Xiangfang Li, “Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach,” In the proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05), 2005.
Gunhee Lee, Dong-kyoo Kim, Jungtaek Seo, “An approach to mitigate wormhole attack in wireless ad hoc networks,” In the proceedings of the international conference on information security and assurance, pp. 220–5, 2008.
Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani, “Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme,” In the proceedings of the IEEE international conference on availability, reliability and security , pp. 636–41,2008.
Xia Wang and Johnny Wong, “An end-to-end detection of wormhole attack in wireless ad-hoc networks”. In the proceedings of the 31st annual international computer software and applications conference (COMPSAC); 2007.
Issa Khalil, Saurabh Bagchi, Ness B. Shroff, “LITEWORP: a Lightweight countermeasure for the wormhole attack in multihop wireless networks”. In the proceedings of the 2005 Iternational conference on dependable systems and networks (DSN’05); 2005.
Issa Khalil, Saurabh Bagchi, and Ness B. Shroff. “MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks, ” In the IEEE securecomm and workshops, pp. 1–12, 2006.
Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. “A Secure routing protocol for ad hoc networks.”In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.