相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
Muhannad Tahboush et al.
IEEE ACCESS (2021)
JGraphT-A Java Library for Graph Data Structures and Algorithms
Dimitrios Michail et al.
ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE (2020)
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
Pallavi Kaliyar et al.
COMPUTERS & SECURITY (2020)
Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
Ohida Rufai Ahutu et al.
IEEE ACCESS (2020)
A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks
Mahsa Ghaznavi et al.
COMPUTER COMMUNICATIONS (2019)
Network bottlenecks in OLSR based ad-hoc networks
Nadav Schweitzer et al.
AD HOC NETWORKS (2019)
A channel hopping based defense method against primary user emulation attack in cognitive radio networks
Arash Ahmadfard et al.
COMPUTER COMMUNICATIONS (2019)
CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack
Xiao Luo et al.
IEEE ACCESS (2019)
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
Ahmed Raoof et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
Bharat Bhushan et al.
WIRELESS PERSONAL COMMUNICATIONS (2018)
Confirmation of wormhole attack in MANETs using honeypot
Divya Sai Keerthi Tiruvakadu et al.
COMPUTERS & SECURITY (2018)
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
Gao Liu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
A Survey of the State-of-the-Art Localization Techniques and Their Potentials for Autonomous Vehicle Applications
Sampo Kuutti et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Nadav Schweitzer et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)
Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
Parvinder Kaur et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
Future of IoT Networks: A Survey
Suk Kyu Lee et al.
APPLIED SCIENCES-BASEL (2017)
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Tasnuva Mahjabin et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
Nadav Schweitzer et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2016)
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
Mohamed S. Abdalzaher et al.
SENSORS (2016)
Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol
Parmar Amish et al.
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016 (2016)
Game theoretic approach to optimize the throughput of cognitive radio networks in physical layer attacks
Arash Ahmadfard et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2015)
Maximum Damage Malware Attack in Mobile Wireless Networks
M. H. R. Khouzani et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
Hidden Markov Model for shortest paths testing to detect a Wormhole Attack in a localized Wireless Sensor Network.
Victor Obado et al.
ANT 2012 AND MOBIWIS 2012 (2012)
Maximum Damage Battery Depletion Attack in Mobile Sensor Networks
M. H. R. Khouzani et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2011)
A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks
Majid Meghdadi et al.
IETE TECHNICAL REVIEW (2011)
DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS
Yanzhi Ren et al.
IEEE WIRELESS COMMUNICATIONS (2010)
Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
Majid Khabbazian et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
On variants of shortest-path betweenness centrality and their generic computation
Ulrik Brandes
SOCIAL NETWORKS (2008)
Some unique properties of eigenvector centrality
Phillip Bonacich
SOCIAL NETWORKS (2007)
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
Radha Poovendran et al.
WIRELESS NETWORKS (2007)
A measure of betweenness centrality based on random walks
MEJ Newman
SOCIAL NETWORKS (2005)
Community structure in social and biological networks
M Girvan et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2002)
Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality
MEJ Newman
PHYSICAL REVIEW E (2001)