AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[3] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[5] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[7] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[8] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[9] Douglas S. J. De Couto,et al. High-throughput routing for multi-hop wireless networks , 2004 .
[10] C. Mitchell,et al. 2 HARP : A SECURE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS , 2004 .
[11] Niki Pissinou,et al. Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.
[12] Mohammed Tarique,et al. Routing overhead analysis for reactive routing protocols in wireless ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[13] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[14] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[15] S. Upadhyaya,et al. Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .
[16] A.P. Subramanian,et al. Interference aware routing in multi-radio wireless mesh networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[17] Neco Ventura,et al. A metric to increase throughput in untrustworthy multi-hop wireless mesh networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[18] Hari Balakrishnan,et al. Quality-Aware Routing Metrics for Time-Varying Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Yuguang Fang,et al. A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.
[20] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[21] David Malone,et al. MAC Layer Channel Quality Measurement in 802.11 , 2007, IEEE Communications Letters.
[22] Ding Xuyang,et al. Trust Evaluation Based Reliable Routing in Wireless Mesh Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[23] Simon Pietro Romano,et al. REFACING: An autonomic approach to network security based on multidimensional trustworthiness , 2008, Comput. Networks.
[24] Yaling Yang,et al. Design Guidelines for Routing Metrics in Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[25] Simon Pietro Romano,et al. A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[26] Paolo Santi,et al. The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.
[27] Xin Zhang,et al. Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.
[28] Jonathan Loo,et al. SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks , 2010, Journal of Network and Systems Management.
[29] Yu Cheng,et al. Mitigating selective forwarding attacks with a channel-aware approach in WMNS , 2010, IEEE Transactions on Wireless Communications.
[30] Shaojie Tang,et al. Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks , 2010, IEEE Transactions on Mobile Computing.
[31] Somanath Tripathy,et al. Secure Peer-Link Establishment in Wireless Mesh Networks , 2012, ACITY.
[32] Somanath Tripathy,et al. Reliability Enhanced Routing Protocol for Wireless Mesh Networks , 2012, ACITY.
[33] Antonio Capone,et al. Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks , 2013, IEEE/ACM Transactions on Networking.