Asymmetric and dynamic encryption for routing security in MANETs
暂无分享,去创建一个
[1] Tae-Hyung Kim,et al. LT-OLSR: Attack-tolerant OLSR against link spoofing , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[2] Burton S. Kaliski. IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract) , 1996, Security Protocols Workshop.
[3] King Sun Chan,et al. TCBWD: Topological comparison-based Byzantine wormhole detection for MANET , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[4] Jalel Ben-Othman,et al. A new method to secure RA-OLSR using IBE , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[5] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[6] L. Javier García-Villalba,et al. Secure extension to the optimised link state routing protocol , 2011, IET Inf. Secur..
[7] Bart Preneel,et al. Cryptanalysis of Dynamic SHA(2) , 2009, Selected Areas in Cryptography.
[8] Ahmed Habbani,et al. Efficient Heuristic Based on Clustering Approach for OLSR , 2013, J. Comput. Networks Commun..
[9] Mayank Singhal,et al. Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) , 2013 .
[10] T. Rama Rao,et al. Regression-based trust model for mobile ad hoc networks , 2012, IET Inf. Secur..
[11] Ilango Krishnamurthi,et al. Enhanced OLSR for defense against DOS attack in ad hoc networks , 2013, Journal of Communications and Networks.
[12] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[13] R. Leela Velusamy,et al. Black hole attack and their counter measure based on trust management in manet: A survey , 2011, ARTCom 2011.
[14] S. Bose,et al. Impact of Gray hole attack on adhoc networks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[15] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[16] Nei Kato,et al. Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.
[17] Saadiah Yahya,et al. Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).
[18] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[19] Dr Pradip M. Jawandhiya. A Survey of Mobile Ad Hoc Network Attacks , 2019 .