An end-to-end approach to secure routing in MANETs
暂无分享,去创建一个
J. J. Garcia-Luna-Aceves | Stephen Dabideen | Bradley R. Smith | B. R. Smith | J. Garcia-Luna-Aceves | S. Dabideen
[1] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[3] Tracy Camp,et al. Two Standards for Rigorous MANET Routing Protocol Evaluation , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[4] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[6] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[7] Jean-Chrysostome Bolot,et al. End-to-end packet delay and loss behavior in the internet , 1993, SIGCOMM '93.
[8] Tracy Camp,et al. Minimal Standards for Rigorous MANET Routing Protocol Evaluation * , 2006 .
[9] Jean-Chrysotome Bolot. End-to-end packet delay and loss behavior in the internet , 1993, SIGCOMM 1993.
[10] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[11] Sandra L. Murphy,et al. Digital signature protection of the OSPF routing protocol , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[12] Parameswaran Ramanathan,et al. What do packet dispersion techniques measure? , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[13] kc claffy,et al. Bandwidth estimation: metrics, measurement techniques, and tools , 2003, IEEE Netw..
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] Dmitri Loguinov,et al. Packet-pair bandwidth estimation: stochastic analysis of a single congested node , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[16] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[17] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[18] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[19] Srinivasan Keshav. A control-theoretic approach to flow control , 1991, SIGCOMM 1991.
[20] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[21] Mats Björkman,et al. A new end-to-end probing and analysis method for estimating bandwidth bottlenecks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[22] Michalis Faloutsos,et al. Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.