Defending against wormhole attacks in mobile ad hoc networks
- 9 January 2006
- journal article
- research article
- Published by Wiley in Wireless Communications and Mobile Computing
- Vol. 6 (4), 483-503
- https://doi.org/10.1002/wcm.292
Abstract
No abstract availableKeywords
This publication has 42 references indexed in Scilit:
- Hierarchical routing in ad hoc mobile networksWireless Communications and Mobile Computing, 2002
- Geographical routing using partial information for wireless ad hoc networksIEEE Wireless Communications, 2001
- Securing ad hoc networksIEEE Network, 1999
- Composable ad hoc location‐based services for heterogeneous mobile clientsWireless Networks, 1999
- Global Positioning SystemPublished by Springer Science and Business Media LLC ,1997
- A new location technique for the active officeIEEE Wireless Communications, 1997
- Security problems in the TCP/IP protocol suiteACM SIGCOMM Computer Communication Review, 1989
- Optimal Transmission Ranges for Randomly Distributed Packet Radio TerminalsIEEE Transactions on Communications, 1984
- The Byzantine Generals ProblemACM Transactions on Programming Languages and Systems, 1982
- Theory of Spread-Spectrum Communications - A TutorialIEEE Transactions on Communications, 1982