Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
4 SI
Page No.
3753 - 3757
References
Ding, X., T. Song, Y. Zou and X. Chen, 2016. Security-reliability tradeoff for friendly Jammer assisted user-pair selection in the face of multiple eavesdroppers. IEEE. Access, 4: 8386-8393.
CrossRef | Direct Link | Ji, S., T. Chen and S. Zhong, 2015. Wormhole attack detection algorithms in wireless network coding systems. IEEE. Trans. Mobile Comput., 14: 660-674.
CrossRef | Direct Link | Li, J., H. Lu and M. Guizani, 2015. ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distributed Syst., 26: 938-948.
CrossRef | Direct Link | Lou, X., H. Yao, C.W. Tan and J. Wang, 2015. Vander: Efficient cooperative watchdog monitoring for Lossy wireless network coding. IEEE. Trans. Veh. Technol., 64: 702-713.
CrossRef | Direct Link | Lv, L., J. Chen, L. Yang and Y. Kuo, 2017. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation. IET. Commun., 11: 393-399.
CrossRef | Direct Link | Pelechrinis, K., M. Iliofotou and S.V. Krishnamurthy, 2011. Denial of service attacks in wireless networks: The case of jammers. IEEE. Commun. Surv. Tutorials, 13: 245-257.
CrossRef | Direct Link | Proano, A. and L. Lazos, 2012. Packet-hiding methods for preventing selective jamming attacks. IEEE. Trans. Depend. Secure Comput., 9: 101-114.
CrossRef | Direct Link |