An approach to Handle Man in Middle Attack in Cluster based Architecture
暂无分享,去创建一个
[1] Dipak Ghosal,et al. Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.
[2] L. Qian,et al. Secure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[3] V. G Rani,et al. Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad Hoc Networks , 2010 .
[4] Hongming Yang,et al. A Novel QoS Multipath Path Routing in MANET , 2010, J. Digit. Content Technol. its Appl..
[5] Kalpana Sharma,et al. A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .
[6] Elisavet Konstantinou. Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[7] J. Chandra,et al. A cluster based security model for mobile ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[8] Ejaz Ahmed,et al. Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks , 2006 .
[9] Der-Jiunn Deng,et al. Cluster-based secure communication mechanism in wireless ad hoc networks , 2010, IET Inf. Secur..