Asian Journal of Information Technology
156 - 161
Neighbor Condition Based Light Weight Region Based Approach for Detection and Mitigation of Sinkhole Attacks in Mobile Adhoc Networks
Choi, M. and H. Choo, 2011. Bypassing hole scheme using observer packets for geographic routing in WSNs. Proceeding of the 2011 International Conference on Information Networking (ICOIN), January 26-28, 2011, IEEE, Barcelona, Spain, pp: 435-440.
Krontiris, I., T. Giannetsos and T. Dimitriou, 2008. Launching a sinkhole attack in wireless sensor networks; the intruder side. Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008, WIMOB'08, October 12-14, 2008, IEEE, Avignon, France, pp: 526-531.
Otero, G.M. and A.P. Hernandez, 2012. Detection of wormhole attacks in wireless sensor networks using range-free localization. Proceeding of the 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), September 17-19, 2012, IEEE, Barcelona, Spain, pp: 21-25.
Qi, J., T. Hong, K. Xiaohui and L. Qiang, 2012. Detection and defence of sinkhole attack in wireless sensor network. Proceedings of the IEEE 14th International Conference on Communication Technology, November 9-11, 2012, Chengdu, pp: 809-813.
Rassam, M.A., A. Zainal, M.A. Maarof and M. Al-Shaboti, 2012. A sinkhole attack detection scheme in mintroute wireless sensor networks. Proceeding of the 2012 International Symposium on Telecommunication Technologies (ISTT), November 26-28, 2012, IEEE, Kuala Lumpur, pp: 71-75.
Sharmila, S. and G. Umamaheswari, 2011. Detection of sinkhole attack in wireless sensor networks using message digest algorithms. Proceeding of the 2011 International Conference on Process Automation, Control and Computing (PACC), July 20-22, 2011, IEEE, Coimbatore, India, pp: 1-6.
Sheela, D., K.C. Naveen and G. Mahadevan, 2011. A non cryptographic method of sinkhole attack detection in wireless sensor networks. Proceedings of the IEEE International Conference on Recent Trends in Information Technology, June 3-5, 2011, Chennai, Tamil Nadu, pp: 527-532.
Shin, I., N.D. Pham and H. Choo, 2009. Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs. In: Human Interface and the Management of Information, Designing Information Environments. Michael, S.J. and S. Gavriel (Eds.). Springer Berlin Heidelberg, Heidelberg, Germany, pp: 619-627.
Teng, L. and Y. Zhang, 2010. SeRA: A secure routing algorithm against sinkhole attacks for mobile wireless sensor networks. Proceedings of the 2nd International Conference on Computer Modeling and Simulation, Volume 4, January 22-24, 2010, Sanya, Hainan, pp: 79-82.
Yu, F., S. Park, Y. Tian, M. Jin and S.H. Kim, 2008. Efficient hole detour scheme for geographic routing in wireless sensor networks. Proceeding of the Vehicular Technology Conference on VTC Spring 2008, May 11-14, 2008, IEEE, Singapore, Asia, pp: 153-157.