A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
暂无分享,去创建一个
[1] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[2] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[3] Dawn Song,et al. TESLA: Multicast Source Authentication Transform , 2000 .
[4] Shiyong Zhang,et al. Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).
[5] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Charles E. Perkins,et al. Mobile IP Authentication, Authorization, and Accounting Requirements , 2000, RFC.
[7] Karl N. Levitt,et al. Distributed intrusion detection models for mobile ad hoc networks , 2006 .
[8] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[9] Karl N. Levitt,et al. DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET , 2007, ASIACCS '07.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[11] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..