… Abstract: This paper provides a detailed analysis on the threats of topology-exposure in Mobile AdHocNetwork (MANET) and proposes a secure topology-hiding multipath routing …
… This paper presents a study of standardized clock … Given the inevitability of potential attacks such as Sybilattacks[8], … themselves into an ad-hocnetwork and the root of the network is dy…
… The fable of the bees: Incentivizing robust revocation decision making in adhocnetworks. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. pp. …
… attacks in routing protocol lossy network based on loT application. The Sybilattack is one most common types of attack … |58|| study the phases of Sybilattacks and their countermeasures …
辛燕, 冯霞, 李婷婷 - Journal on Communications, 2017 - infocomm-journal.com
… Defense against Sybilattack in the initial deployment stage of vehicular adhocnetwork … aided physical measurement-based Sybil nodes detection mechanism in vehicular adhoc …
… in the number of complicated sybilattacks, but also can … Defensemechanism against node replication attacks and … Modeling and analyzing the sybilattack to adhoc routing protocols [C]/…
… results of some cyber security attacks and defensemechanisms on the UAVs. Especially, … 络(WSNs,wireless sensor networks)和移动AdHoc 网络(MANETs,mobile ad-hocnetworks).但由 …