An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Phung Huu Phu,et al. Securing AODV Routing Protocol in Mobile Ad-Hoc Networks , 2009, IWAN.
[3] Stefan Schlott,et al. Secure Dynamic Source Routing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[4] Mahalingam Ramkumar,et al. An Efficient Secure Route Discovery Protocol for DSR , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[5] M. Tadayon,et al. Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks , 2011 .
[6] R. Lee,et al. Using Dominating Sets with 2-Hop Neighborhood Information to Improve the Ad-Hoc On-Demand Distance Vector Routing* , 2011 .
[7] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[8] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[9] Chris J. Mitchell,et al. Malicious attacks on ad hoc network routing protocols , 2007 .
[10] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[11] Gruia Calinescu. Computing 2-Hop Neighborhoods in Ad Hoc Wireless Networks , 2003, ADHOC-NOW.
[12] P. Khatri,et al. A Survey on Security issues in Mobile ADHOC networks , 2009 .
[13] Ranvijay,et al. A REVIEW PAPER ON AD HOC NETWORK SECURITY , 2007 .
[14] Srdjan Capkun,et al. BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.
[15] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[16] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[17] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[18] Ranga S. Ramanujan,et al. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[19] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.