Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 1
Page No. 77 - 81

An Enhanced Method to Detect and Prevent Wormhole Attack in m-Commerce

Authors : S.M. Udhaya Sankar, V. Vijaya Chamundeeswari and Jeevaa Katiravan

References

Abdesselam, F.N., B. Bensaou and T. Taleb, 2008. Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE. Commun. Mag., 46: 127-133.
CrossRef  |  Direct Link  |  

Azer, M.A., 2011. Wormhole attacks mitigation in ad hoc networks. Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES), August 22-26, 2011, IEEE, Cairo, Egypt, ISBN:978-1-4577-0979-1, pp: 561-568.

Chen, H., W. Lou and Z. Wang, 2010. Secure localization against wormhole attacks using conflicting sets. Proceedings of the IEEE 29th International Performance Computing and Communications Conference, December 9-11, 2010, Albuquerque, NM., USA., pp: 25-33.

Hu, Y.C., A. Perrig and D.B. Johnson, 2006. Wormhole attacks in wireless networks. IEEE. J. Sel. Areas Commun., 24: 370-380.
CrossRef  |  Direct Link  |  

Pai, H.T. and F. Wu, 2009. Preventing wormhole attacks in mobile commerce. Proceedings of the IEEE International Conference on E-Business Engineering (ICEBE'09), October 21-23, 2009, IEEE, Chiayi, Taiwan, ISBN:978-0-7695-3842-6, pp: 437-442.

Pai, H.T. and F. Wu, 2011. Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks. Electronic Commerce Res. Appl., 10: 384-397.
Direct Link  |  

Sharma, P. and A. Trivedi, 2011. An approach to defend against wormhole attack in ad hoc network using digital signature. Proceedings of the IEEE 3rd International Conference On Communication Software and Networks (ICCSN), May 27-29, 2011, IEEE, New York, USA., ISBN:978-1-61284-485-5, pp: 307-311.

Soni, P., 2010. M-payment between banks using SMS: Point of view. Proc. IEEE., 98: 903-905.
CrossRef  |  Direct Link  |  

Su, X. and R.V. Boppana, 2008. Mitigating wormhole attacks using passive monitoring in mobile ad hoc networks. Proceedings of the IEEE Conference on Global Telecommunications GLOBECOM, November 30- December 4, 2008, IEEE, San Antonio, Texas, ISBN:978-1-4244-2324-8, pp: 1-5.

Tabandehjooy, A.A. and N. Nazhand, 2010. A lighweight and secure protocol for mobile payments via wireless internet in m-commerce. Proceedings of the International Conference on E-Education, E-Business, E-Management and E-Learning (IC4E'10), January 22-24, 2010, IEEE, Shiraz, Iran, ISBN:978-1-4244-5680-2, pp: 495-498.

Wang, X. and J. Wong, 2007. An end-to-end detection of wormhole attack in wireless ad-hoc networks. Proceedings of the 31st Annual International Conference on Computer Software and Applications Conference (COMPSAC07), Vol. 1, July 24-27, 2007, IEEE, New York, USA., ISBN:0-7695-2870-8, pp: 39-48.

Yuan, M. and D. Xinglin, 2011. The realization of pay for safety of M-commerce based on WAP. Proceedings of the 2011 International Conference on E-Business and E-Government (ICEE), May 6-8, 2011, IEEE, Qingdao, China, ISBN:978-1-4244-8691-5, pp: 1-3.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved