Scrounger Outbreaks Strenuous Life From Wireless Adhoc Sensor Networks
Abstract
Keywords
References
Eugene Y.Vasserman , Nicholas Hopper, Vampire He received his B.Tech Degree in attacks:Draining life from wireless ad-hoc sensor networks. Information Technology in 2007at IEEE Transactions on Mobile Computing, Vol. 12, No. 2, Anna University, Chennai, Tamil Nadu.
“The Network Simulator - ns-2,â€
http://www.isi.edu/nsnam/security, privacy and anonymity and web ns, 2012 services.
I. Aad, J.-P. Hubaux, and E.W. Knightly, “Denial of Service
Resilience in Ad Hoc Networks,†Proc. ACM MobiCom, 2004.
G. Acs, L. Buttyan, and I. Vajda, “Provably Secure OnDemand Source Routing in Mobile Ad Hoc Networks,†IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 15331546, Nov. 2006.
B. Parno, M. Luk, E. Gaustad, and A. Perrig, “Secure Sensor Network Routing: A Clean-Slate Approach,†CoNEXT: Proc. ACM CoNEXT Conf., 2006
T. Aura, “Dos-Resistant Authentication with Client Puzzles,†Proc.Int’l Workshop Security Protocols, 2001.
J. Bellardo and S. Savage, “802.11 Denial-of-Service
Attacks: Real Vulnerabilities and Practical Solutions,†Proc. 12th Conf. USENIX Security, 2003.
I.F. Blaked, G. Seroussi, and N.P. Smart, Elliptic Curves in Cryptography, vol. 265. Cambridge Univ. , 1999.
J.W. Bos, D.A. Osvik, and D. Stefan, “Fast Implementations of AES on Various Platforms,†Cryptology ePrint Archive, Report 2009/ 501, http://eprint.iacr.org, 2009.
H.Chan and A. Perrig, “Security and Privacy in Sensor Networks,†Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
J.-H. Chang and L. Tassiulas, “Maximum Lifetime Routing in Wireless Sensor Networks,†IEEE/ACM Trans.
Networking, vol. 12, no. 4, pp. 609-619, Aug. 2004.
T.H. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), IETF RFC 3626, 2003.
J. Deng, R. Han, and S. Mishra, “Defending against PathBased DoS Attacks in Wireless Sensor Networks,†Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.
L.M. Feeney, “An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,†Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â