Securing Geographical Routing in Mobile Ad-hoc Networks
暂无分享,去创建一个
[1] Gregory G. Finn,et al. Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report. , 1987 .
[2] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[3] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[4] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[7] Christian Bettstetter,et al. Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[9] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[10] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[11] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[12] Jörg Widmer,et al. Hierarchical location service for mobile ad-hoc networks , 2004, MOCO.
[13] Mohan S. Kankanhalli,et al. Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[14] Evangelos Kranakis,et al. Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) , 2004, ICICS.
[15] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[16] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[17] Bharat K. Bhargava,et al. AO2P: ad hoc on-demand position-based private routing protocol , 2005, IEEE Transactions on Mobile Computing.
[18] Young-Jin Kim,et al. Geographic routing made practical , 2005, NSDI.
[19] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[20] Andreas Heinemann,et al. Survey on Location Privacy in Pervasive Computing , 2005 .
[21] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[22] Ness B. Shroff,et al. Geographic routing in the presence of location errors , 2005, 2nd International Conference on Broadband Networks, 2005..
[23] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[24] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[25] T. Leinmüller,et al. Greedy Routing in Highway Scenarios : The Impact of Position Faking Nodes , 2006 .
[26] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[27] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .