暂无分享,去创建一个
[1] Raed A. Alsaqour,et al. Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.
[2] Nai-Wei Lo,et al. A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .
[3] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[4] Panayiotis Kotzanikolaou,et al. Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[5] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[6] Byrav Ramamurthy,et al. An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2006, MSN.
[7] Sanjeev Rana,et al. Security-Aware Efficient Route Discovery for DSR in MANET , 2010, ICT.
[8] Ming Li,et al. Enabling secure and reliable policy-based routing in MANETs , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[9] Sanjay Agrawal,et al. A Proposed Solutionfor Security Issues In MANETs , 2013 .
[10] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[11] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[12] Anuj K. Gupta,et al. A Comprehensive Review of Security Issues in Manets , 2013 .
[13] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[14] F. Richard Yu,et al. Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..
[15] Sanjay Keer,et al. To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[16] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[17] Xixiang Lv,et al. Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks , 2013, IET Inf. Secur..
[18] Yahui Yang,et al. Policy-Based Time Slot Assignment algorithm in a MANET(PBTSA) , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[19] Rajneesh Gujral,et al. Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS , 2010, BAIP.
[20] Jian Su,et al. Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network , 2011, ICAIC.
[21] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[22] H. Vincent Poor,et al. Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.
[23] Tarek N. Saadawi,et al. IEEE 802.11 Denial of Service attack detection in MANET , 2012, Wireless Telecommunications Symposium 2012.
[24] Srihari Nelakuditi,et al. Pair-wise resistance to traffic analysis in MANETs , 2008, MOCO.
[25] Mehdi Berenjkoub,et al. A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks , 2008 .
[26] Michael P. Howarth,et al. Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.
[27] Merin Achankunju,et al. Particle swarm optimization based secure QoS clustering for mobile ad hoc network , 2013, 2013 International Conference on Communication and Signal Processing.
[28] Syed Rehan Afzal,et al. RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[29] Ankur Mishra,et al. A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[30] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.
[31] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[32] Pallavi Kaliyar,et al. A secure routing protocol for MANETs against byzantine attacks , 2013 .
[33] P T Tharani,et al. SECURED CONSISTENT NETWORK FOR COPING UP WITH FABRICATION ATTACK IN MANET , 2013 .
[34] Xu Huang,et al. Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.
[35] Manju Khari,et al. Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey , 2012 .
[36] P. Subathra,et al. Establishment of stable certificate chains for authentication in mobile ad hoc networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[37] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[38] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[39] Jalel Ben-Othman,et al. Defending method against jamming attack in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[40] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[41] S. Radha,et al. A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[42] S. Bose,et al. Impact of Gray hole attack on adhoc networks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[43] A. El-Sayed. Clustering Based Group Key Management for MANET , 2013, SecNet.
[44] Emmanouil A. Panaousis,et al. Secure routing for supporting ad-hoc extreme emergency infrastructures , 2010, 2010 Future Network & Mobile Summit.
[45] F. De Rango,et al. EE-OLSR: Energy Efficient OLSR routing protocol for Mobile ad-hoc Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[46] Arputharaj Kannan,et al. Enhanced intrusion detection techniques for mobile ad hoc networks , 2007 .
[47] K. Vishnu. A new kind of transport layer attack in wireless Ad Hoc Networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[48] Chen Wei,et al. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[49] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[50] Jaydip Sen,et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[51] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[52] Palaniandavar Venkateswaran,et al. Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks , 2011 .
[53] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[54] Khaleel Ur Rahman Khan,et al. Integrating Mobile Ad Hoc Networks and the Internet: challenges and a review of strategies , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[55] Zhifeng Zhao,et al. Availability based trust model of clusters for MANET , 2010, 2010 7th International Conference on Service Systems and Service Management.
[56] Durgesh Kumar Mishra,et al. Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[57] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[58] Hyoung-Kee Choi,et al. A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6 , 2009, EURASIP J. Wirel. Commun. Netw..
[59] Shiyong Zhang,et al. Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).
[60] Mohsen Guizani,et al. A Fuzzy-Based Hierarchical Energy Efficient Routing Protocol for Large Scale Mobile Ad Hoc Networks (FEER) , 2006, 2006 IEEE International Conference on Communications.
[61] B. Parvathavarthini,et al. An efficient cluster based key management scheme for MANET with authentication , 2010, Trendz in Information Sciences & Computing(TISC2010).
[62] Nei Kato,et al. On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.
[63] Isabelle M. Demeure,et al. Transhumance: A platform on a Mobile Ad hoc NETwork challenging collaborative gaming , 2008, 2008 International Symposium on Collaborative Technologies and Systems.