Enhancing the Security of MANETs using Hash Algorithms
暂无分享,去创建一个
[1] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[2] Zygmunt J. Haas,et al. The Bordercast Resolution Protocol (BRP) for Ad Hoc Networks , 2002 .
[3] Mihaela Cardei,et al. Routing Security in Ad Hoc Wireless Networks , 2010 .
[4] Niroj Kumar Pani. A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks , 2009 .
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] Emin Gün Sirer,et al. SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks , 2003, MobiHoc '03.
[7] Pardeep Singh,et al. New Scheme of Adaptive Zone Routing Protocol , 2010 .
[8] Leonard Barolli,et al. A Zone Based Routing Protocol for Ad Hoc Networks and Its Performance Improvement by Reduction of Control Packets , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[9] L. Nassef,et al. Enhancing security of zone-based routing protocol using trust , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[10] Gabriel Montenegro,et al. Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.
[11] N. Beijar. Zone Routing Protocol ( ZRP ) , 2002 .
[12] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[13] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[14] Saud Rugeish Alotaibi. Stability of secure routing protocol in ad hoc wireless network , 2010 .
[15] CastellucciaClaude,et al. Crypto-based identifiers (CBIDs) , 2004 .
[16] S. Duraisamy,et al. A trust system in manet with secure key authentication mechanism , 2012, 2012 International Conference on Recent Trends in Information Technology.