您当前的位置:
首页 >
文章列表页 >
Research on wormhole attacks in wireless mesh networks
更新时间:2024-10-14
    • Research on wormhole attacks in wireless mesh networks

    • Vol. 32, Issue 1, Pages: 59-65(2011)
    • CLC: TN929.5
    • Published:2011

    移动端阅览

  • FU Ying-fang1, ZHANG Xing1, ZHANG Ting1, et al. Research on wormhole attacks in wireless mesh networks[J]. 2011, 32(1): 59-65. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

935

下载量

4

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Reliable energy-efficient routing protocol based on anomalous detection and AUV-aid for underwater sensor networks
Intelligent route planning method with jointing topology control of UAV swarm
Time deterministic routing algorithm and protocol based on time-varying graph over the space-ground integrated network
Development and outlook of deep space communication network protocol
Secure localization scheme against wormhole attack for wireless sensor networks

Related Author

WANG Zhigang
TIAN Xiaojing
WANG Lijuan
DU Xiujuan
LI Chong
Zhenglun YI
Zhi YAN
Bo OUYANG

Related Institution

College of Computer, Qinghai Provincial Key Laboratory of IoT, Qinghai Normal University
The State Key Laboratory of Tibetan Intelligent Information Processing and Application
School of Computer Science, North China Institute of Science and Technology
College of Electrical and Information Engineering,Hunan University
Network Operation Center of China Telecom Fujian Branch
0