[1]
Yih-Chun Hu, Adrian Perrig, and David. B. Johnson, in: Packet Leashes : a defense againse wormhole attacks in wireless networks, ". In Proceeding of Twenty-second Annual Joint Conference of the IEEE Computer and Communications(INFOCOM 2003), vol. 3, p.1976–1986, April (2003).
DOI: 10.1109/infcom.2003.1209219
Google Scholar
[2]
Lingxuan Hu, David Evans, in: Using directional antennas to prevent worehole attacks. In Network and Distributed System Security Symposium, J. New York. USA, vol. 8, p.41–77, Feb (2005).
Google Scholar
[3]
Issa Khalil, Saurabh Bagchi, and Ness B. Shroff, in: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In Proceeding of the 2005 International Conference on Dependable Systems and Networks(DSN'05), Lafayette. USA, p.612–621, July (2005).
DOI: 10.1109/dsn.2005.58
Google Scholar
[4]
David.B. Johnson, David A. Maltz, and Josh Broch, in: The DynamicSource Routing Protocol for Multihop Wireless Ad Hoc Networks. InAd Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139–172. Addison-Wesley, (2001).
Google Scholar
[5]
Norman Abramson, in: The ALOHA System--Another Alternative for Computer Communi-cations. In Proceedings of the Fall 1970 AFIPSComputer Conference, pages 281–285, November (1970).
DOI: 10.1145/1478462.1478502
Google Scholar
[6]
Bhargav Bellur and Richard G. Ogier, in: A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks. In Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'99), pages 178–186, March (1999).
DOI: 10.1109/infcom.1999.749266
Google Scholar
[7]
Helion Technology Ltd, in: High Performance Solutions in Silicon-MD5 Core. Cambridge, England. Information on http: /www. heliontech. com/core5. htm.
Google Scholar
[8]
Jiejun Konh, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang, in: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), pages 251–260, November (2001).
DOI: 10.1109/icnp.2001.992905
Google Scholar
[9]
Frank Stajano and Ross Anderson, in: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany, (1999).
DOI: 10.1007/10720107_24
Google Scholar
[10]
Xia Wang, Johnny Wong, in: An End-to-end Detection of Wormhole Attack in Wireless ad-hoc Networks. In 31st Annual International Computer Software and Applications Conference(C0MPSAC 2007), pages 39–48, July (2007).
DOI: 10.1109/compsac.2007.63
Google Scholar
[11]
Charles E. Perkins and Elizabeth M. Royer, in: Ad-Hoc On-Demand Distance Vector Routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), pages 90–100, February (1999).
DOI: 10.1109/mcsa.1999.749281
Google Scholar
[12]
Amir Qayyum, Laurent Viennot, and Anis Laouiti, in: Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, Project HIPERCOM, INRIA, February (2000).
DOI: 10.1109/hicss.2002.994521
Google Scholar