ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[3] Kamesh Namuduri,et al. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..
[4] Cynthia E. Irvine,et al. An Ontological Approach to Secure MANET Management , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[5] Srikanth V. Krishnamurthy,et al. Ad Hoc Networks: Technologies And Protocols , 2009, ADHOCNETS 2010.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[8] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[9] Klara Nahrstedt,et al. SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks , 2009, IEEE Transactions on Information Forensics and Security.
[10] Magdy S. El-Soudani,et al. Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[11] Lei Feng-Yu,et al. Ad Hoc Networks Security Mechanism Based on CPK , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[12] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[13] M. Hauspie,et al. Enhancing nodes cooperation in ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[14] Liu Dan,et al. A Novel Cryptography for Ad Hoc Network Security , 2006, 2006 International Conference on Communications, Circuits and Systems.
[15] Jeong Hyun Yi,et al. Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.
[16] Imrich Chlamtac,et al. A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.
[17] Jun Zheng,et al. Security in Wireless Mesh Networks , 2007 .
[18] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[19] Mukesh Singhal,et al. Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks , 2005, MSWiM '05.
[20] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[21] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[22] Binod Vaidya,et al. Robust and secure routing scheme for wireless multihop network , 2009, Personal and Ubiquitous Computing.
[23] Zuriati Ahmad Zulkarnain,et al. Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment. , 2009 .
[24] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[25] Stamatios V. Kartalopoulos. Security of Information and Communication Networks , 2009 .
[26] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[27] G. Pulla,et al. A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols , 2010 .
[28] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[29] Mario Gerla,et al. GloMoSim: A Scalable Network Simulation Environment , 2002 .
[30] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[31] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[32] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[33] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[34] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.
[35] Samir Ranjan Das,et al. Query Localization Techniques for On-Demand Routing Protocols in Ad Hoc Networks , 1999, Wirel. Networks.
[36] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[37] Jalel Ben-Othman,et al. Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[38] Ayyaswamy Kathirvel,et al. A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .
[39] Sung-Ju Lee,et al. AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[40] Amitabh Mishra. Security and Quality of Service in Ad Hoc Wireless Networks , 2008 .