Rushing attack against routing protocols in Mobile Ad-Hoc Networks
暂无分享,去创建一个
Shukor Abd Razak | Hassan Chizari | Ismail Fauzi Isnin | Seyed-Mohsen Ghoreishi | S. Razak | Hassan Chizari | I. Isnin | S. Ghoreishi
[2] Jorjeta G. Jetcheva,et al. Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks , 2001, MobiHoc '01.
[3] Lixia Zhang,et al. Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks , 1998, Cluster Computing.
[4] Shih-Lin Wu,et al. Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .
[5] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[6] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[7] V. Palanisamy,et al. Impact of Rushing attack on Multicast in Mobile Ad Hoc Network , 2009, ArXiv.
[8] Zygmunt J. Haas,et al. On the performance of a routing protocol for the reconfigurable wireless network , 1998, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151).
[9] Nabendu Chaki,et al. Routing Misbehavior in Ad Hoc Network , 2010 .
[10] Zygmunt J. Haas,et al. A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.
[11] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.
[12] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[13] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[14] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[15] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.
[16] Ajit Singh,et al. A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .
[17] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[18] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[19] J.J. Garcia-Luna-Aceves,et al. Wireless internet gateways (WINGs) , 1997, MILCOM 97 MILCOM 97 Proceedings.
[20] Rajendra V. Boppana,et al. An adaptive distance vector routing algorithm for mobile, ad hoc networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).