[1] |
AKYILDIZ I F , SU W L , SANKARASUBRAMANIAM Y ,et al. A survey on sensor networks[J]. IEEE Communications Maga ine, 2002,40(8): 102-114.
|
[2] |
ARAMPATZIS T , LYGEROS J , MANESIS S . A survey of applica-tions of wireless sensors and wireless sensor networks[A]. Proceedings of the 13th Mediterranean Conference on Control and Automation[C]. Limassol,Cyprus, 2005. 719-724.
|
[3] |
GARCIA-HERNANDEZ C F , IBARGUENGOYTIA-GONZALEZ P H , GARCIA-HERNANDEZ J ,et al. Wireless sensor networks and ap-plications:a survey[J]. International Journal of Computer Science and Network Security (IJCSNS), 2007,7(3): 264-273.
|
[4] |
ZHOU Y , FANG Y G , ZHANG Y C . Securing wireless sensor net-works:a survey[J]. IEEE Communications Surveys & Tutorials, 2008,10(3): 6-28.
|
[5] |
CHEN X Q,MAKKI K , YEN K , PISSINOU N . Sensor network secu-rity:a survey[J]. IEEE Communications Surveys & Tutorials, 2009,11(2): 52-73.
|
[6] |
HU Y C , PERRIG A , JOHNSON D B . Packet leashes:a defense against wormhole attacks in wireless networks[A]. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM)[C]. San Francisco,USA, 2003. 1976-1986.
|
[7] |
SHOKRI R , POTURALSKI M , RAVOT G ,et al. A practical secure neighbor verification protocol for wireless sensor networks[A]. Proceedings of the Second ACM Conference on Wireless Network Secu-rity[C]. Zurich,Switzerland, 2009. 193-200.
|
[8] |
PHUONG T V , CANH N T , LEE Y K ,et al. Transmission time-based mechanism to detect wormhole attacks[A]. The 2nd IEEE Asia-Pacific Services Computing Conference[C]. Tsukuba Science City,Japan, 2007. 172-178.
|
[9] |
CAPKUN S,BUTTYáN L , HUBAUX J P . SECTOR:secure tracking of node encounters in multi-hop wireless networks[A]. Proceedings of the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN 03)[C]. Fairfax,USA, 2003. 21-32.
|
[10] |
CHIU H S , LUI K S . DelPHI:wormhole detection mechanism for ad-hoc wireless networks[A]. The 1st International Symposium on Wireless Pervasive Computing[C]. Phuket,Thailand, 2006. 1-6.
|
[11] |
WANG W C , BHARGAVA B . Visualization of wormholes in sensor networks[A]. Proceedings of the 2004 ACM Workshop on Wireless security[C]. Philadelphia,USA, 2004. 51-60.
|
[12] |
?ZDEMIR S , MEGHDADI M,GüLER I . A time and trust based wormhole detection algorithm for wireless sensor networks[A]. The 3rd Information Security and Cryptology Conference (ISC'08)[C]. Ankara,Turkey, 2008. 139-144.
|
[13] |
PIRZADA A A , MCDONALD C . Circumventing sinkholes and worm-holes in wireless sensor networks[A]. Proceedings of International Workshop on Wireless Ad-hoc Networks[C]. London,UK, 2005. 1-6.
|
[14] |
KHALIL I , BAGCHI S , SHROFF N B . LITEWORP:a lightweight countermeasure for the wormhole attack in multi-hop wireless networks[A]. Proceedings of the International Conference on Dependable Systems and Networks[C]. Yokohama,Japan, 2005. 612-621.
|
[15] |
KHALIL I , BAGCHI S , SHROFF N B . MOBIWORP:mitigation o the wormhole attack in mobile multihop wireless networks[J]. Elsevier Ad Hoc Networks, 2008,6(3): 344-362.
|
[16] |
RASMUSSEN K B , CAPKUN S . Implications of radio fingerprinting on the security of sensor networks[A]. Proceedings of Third Inter-national Conference on Security and Privacy in Communi ion Net-works,SecureComm[C]. Nice,Frane, 2007. 331-340.
|
[17] |
MEGHDADI M , OZDEMIR S , GULER I . A survey of worm-hole-based attacks and their countermeasures in wireless sensor net-works[J]. The Institution of Electronics and Telecommu ication Engi-neers Technical Review, 2011,28(2): 89-102.
|
[18] |
PAPADIMITRATOS P , POTURALSKI M , SCHALLER P ,et al. Se-cure neighborhood discovery:a fundamental element for mobile ad-hoc networking[J]. IEEE Communications Magazine, 2008,46(2): 132-139.
|
[19] |
POTURALSKI M , PAPADIMITRATOS P , HUBAUX J P . Secure neighbor discovery in wireless networks:formal investigation of pos-sibility[A]. Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security[C]. Tokyo,Japan, 2008. 189-200.
|
[20] |
WEI Y , HEIDEMANN J , ESTRIN D . An energy-efficient MAC pro-tocol for wireless sensor networks[A]. Proceedings of IEEE Informa-tion Communication Conference(INFOCOM2002)[C]. Piscataway,USA, 2002. 1567-1576.
|
[21] |
VAN D T , LANGENDOEN K . An adaptive energy-efficient MAC protocol for wireless sensor networks[A]. SenSys'03:Proceedings of the 1st International Conference on Embedded Networked Sensor Systems[C]. Los Angeles,USA, 2003. 171-180.
|
[22] |
The IEEE 802.15.4 standard (ver.2006)[EB/OL]. .
|
[23] |
OMNeT++Community.OMNeT++[EB/OL]. .
|
[24] |
Castalia Home:Castalia[EB/OL]. .
|
[25] |
BOULIS A.Castalia user's manual[EB/OL]. .
|