Performance comparison of trust-based reactive routing protocols
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] V. Park,et al. An Internet MANET Encapsulation Protocol (IMEP) Specification , 1998 .
[3] Amitava Datta,et al. Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[4] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[5] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[6] Vincent Park,et al. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .
[7] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[8] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[9] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[10] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[11] Laura Marie Feeney,et al. An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..
[12] Chris McDonald,et al. Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .
[13] Roy D. Yates,et al. Inter-relationships of performance metrics and system parameters in mobile ad hoc networks , 2002, MILCOM 2002. Proceedings.
[14] A.A. Pirzada,et al. Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[15] Sung-Ju Lee,et al. AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[16] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[17] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[18] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[19] Dorothy E. Denning,et al. A new paradigm for trusted systems , 1993, NSPW '92-93.
[20] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[21] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[22] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[23] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[24] Nitin H. Vaidya,et al. GeoTORA: a protocol for geocasting in mobile ad hoc networks , 2000, Proceedings 2000 International Conference on Network Protocols.
[25] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[26] Samir R. Das,et al. On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[27] Anthony Ephremides,et al. A distributed routing algorithm for mobile wireless networks , 1995, Wirel. Networks.
[28] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[29] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[30] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[31] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[32] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[33] Chris McDonald,et al. Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .
[34] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[35] Mahesh K. Marina,et al. On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[36] Dimitri P. Bertsekas,et al. Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently Changing Topology , 1981, IEEE Trans. Commun..