Survey-Secure Routing Protocols of MANET
暂无分享,去创建一个
[1] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[2] Fred L. Templin,et al. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.
[3] Sugata Sanyal,et al. A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs) , 2011, ArXiv.
[4] Tomasz Imielinski,et al. GPS-based geographic addressing, routing, and resource discovery , 1999, CACM.
[5] Ranga S. Ramanujan,et al. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] S. Ramanathan,et al. A survey of routing techniques for mobile communications networks , 1996, Mob. Networks Appl..
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[11] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[12] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[13] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[14] Srdjan Capkun,et al. BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.
[15] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[17] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[18] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[19] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[20] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[21] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] ZapataManel Guerrero. Secure ad hoc on-demand distance vector routing , 2002 .
[24] Jalel Ben-Othman,et al. Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..
[25] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[26] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[27] Sufatrio Lam. Scalable Authentication Framework for Mobile-IP (SAFe-MIP) , 1999 .