共 196 条
[2]
Abu Zant M., 2019, HINDAWI SECURITY COM, V2019
[3]
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[4]
Al Farraj O., 2018, J AMBIENT INTELL HUM, V33
[5]
Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2022, 70 (03)
:4241-4259
[8]
Aluvala S., 2016, PERSPECT SCI, V8, P680, DOI [10.1016/J.PISC.2016.06.057, DOI 10.1016/J.PISC.2016.06.057]
[9]
Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol
[J].
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016,
2016, 79
:700-707
[10]
Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2019, 22 (Suppl 5)
:12681-12687