Securely-entrusted multi-topology routing for community networks
暂无分享,去创建一个
[1] Bart Braem,et al. A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[2] Philippe Jacquet,et al. Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .
[3] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[4] Abhay Roy,et al. Multi-Topology (MT) Routing in OSPF , 2007, RFC.
[5] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[6] Zoltán Horváth,et al. Motivations, Design and Business Models of Wireless Community Networks , 2008, Mob. Networks Appl..
[7] Leandro Navarro-Moldes,et al. Evaluation of mesh routing protocols for wireless community networks , 2015, Comput. Networks.
[8] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[9] M. Hauge,et al. Multi-Topology routing for QoS support in the CoNSIS convoy MANET , 2012, 2012 Military Communications and Information Systems Conference (MCC).
[10] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[11] Robert M. Hinden,et al. Unique Local IPv6 Unicast Addresses , 2005, RFC.
[12] Jiannong Cao,et al. Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[13] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[14] Llorenç Cerdà-Alabern,et al. Experimental evaluation of a wireless community mesh network , 2013, MSWiM.
[15] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[16] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[17] Rudra Dutta,et al. A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks , 2011, IEEE Communications Surveys & Tutorials.
[18] Terry Koziniec,et al. An experimental comparison of routing protocols in multi hop ad hoc networks , 2010, 2010 Australasian Telecommunication Networks and Applications Conference.
[19] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[20] Leandro Navarro-Moldes,et al. A technological overview of the guifi.net community network , 2015, Comput. Networks.
[21] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Leandro Navarro-Moldes,et al. Receiver-driven routing for community mesh networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[23] Ralf Steinmetz,et al. A security framework for wireless mesh networks , 2011, Wirel. Commun. Mob. Comput..
[24] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[25] Elizabeth M. Belding-Royer,et al. AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[26] Matthias Hollick,et al. Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[27] Llorenç Cerdà-Alabern,et al. Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh Network , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.