The Village Telco project: a reliable and practical wireless mesh telephony infrastructure, EURASIP Journal on Wireless Communications and Networking, vol.31, issue.0146-4833, pp.1-11, 2011. ,
DOI : 10.1145/505666.505669
LiPaD: lightweight packet drop detection for ad hoc networks, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.1233-1237, 2004. ,
DOI : 10.1109/VETECF.2004.1400219
Model checking security protocols Handbook of Model Checking, 2011. ,
Anomaly intrusion detection in wireless sensor networks, Journal of High Speed Networks, vol.15, issue.1, pp.33-51, 2006. ,
Implications of radio fingerprinting on the security of sensor networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.331-340, 2007. ,
DOI : 10.1109/SECCOM.2007.4550352
Optimized Link State Routing Protocol (OLSR), RFC, vol.3626, 2003. ,
DOI : 10.17487/rfc3626
URL : https://hal.archives-ouvertes.fr/inria-00471712
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.80-89, 2007. ,
DOI : 10.1145/1288107.1288119
Anomaly Detection and Mitigation for Disaster Area Networks, Recent Advances in Intrusion Detection, pp.339-359, 2010. ,
DOI : 10.1007/978-3-642-15512-3_18
URL : http://www.ida.liu.se/%7Ertslab/publications/2010/CucurullEtAl_RAID2010.pdf
Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks , Q2SWinet '05, pp.16-23, 2005. ,
DOI : 10.1145/1089761.1089765
Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.31805-822, 1999. ,
DOI : 10.1016/S1389-1286(98)00017-6
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.564-570, 2006. ,
DOI : 10.1109/WOWMOM.2006.27
Topological detection on wormholes in wireless ad hoc and sensor networks, IEEE/ACM Transactions on Networking, vol.19, issue.6, pp.1787-1796, 2011. ,
DOI : 10.1109/TNET.2011.2163730
Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor networks, IEEE Military Communications Conference, 2003. MILCOM 2003., pp.609-614, 2003. ,
DOI : 10.1109/MILCOM.2003.1290173
Serval mesh software-WiFi multi model management, Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, ACWR '11, pp.71-77, 2011. ,
DOI : 10.1145/2185216.2185245
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting, Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT), pp.201-206, 2004. ,
Attack Analysis and Detection for Ad Hoc Routing Protocols, Recent Advances in Intrusion Detection, pp.125-145, 2004. ,
DOI : 10.1007/978-3-540-30143-1_7
URL : http://www.itsec.gov.cn/docs/20090507142359035138.pdf
Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002. ,
DOI : 10.1145/508791.508835
Short paper, Proceedings of the fourth ACM conference on Wireless network security, WiSec '11, pp.418-420, 2005. ,
DOI : 10.1145/1998412.1998439
A dynamic anomaly detection scheme for aodv-based mobile ad hoc networks. Vehicular Technology, IEEE Transactions on, vol.58, issue.5, pp.2471-2481, 2009. ,
An intrusion detection system for wireless sensor networks, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., pp.253-259, 2005. ,
DOI : 10.1109/WIMOB.2005.1512911
A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), pp.422-427, 2005. ,
DOI : 10.1109/ICW.2005.16
Cross-layer analysis for detecting wireless misbehavior, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., pp.6-9, 2006. ,
DOI : 10.1109/CCNC.2006.1592977
Ad hoc On-Demand Distance Vector (AODV) Routing, RFC, vol.3561, 2003. ,
DOI : 10.17487/rfc3561
Malicious node detection in wireless sensor networks, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., p.24, 2004. ,
DOI : 10.1109/IPDPS.2004.1302934
Sensor node compromise detection, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, pp.242-247, 2007. ,
DOI : 10.1145/1280940.1280993
A cross-layer based intrusion detection approach for wireless ad hoc networks, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., p.7, 2005. ,
DOI : 10.1109/MAHSS.2005.1542882
A Specification-Based Intrusion Detection Model for OLSR, Recent Advances in Intrusion Detection, pp.330-350, 2006. ,
DOI : 10.1007/11663812_17
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET, Recent Advances in Intrusion Detection, pp.249-271, 2006. ,
DOI : 10.1007/11856214_13
A specification-based intrusion detection system for AODV, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.125-134, 2003. ,
DOI : 10.1145/986858.986876
URL : http://seclab.cs.ucdavis.edu/papers/new_aodvids-v1.pdf
Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.255-264, 2002. ,
DOI : 10.1145/586110.586145
URL : http://www.cs.jhu.edu/~fabian/courses/CS600.424/course_papers/wagner02mimicry.pdf
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.219-230, 2007. ,
DOI : 10.1109/SRDS.2007.31