A Survey of MANET Survivability Routing Techniques
暂无分享,去创建一个
[1] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[3] Yanjun Zuo. A Framework of Survivability Requirement Specification for Critical Information Systems , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[4] Guy Pujolle,et al. Survival multipath routing for MANETs , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[5] Klara Nahrstedt,et al. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..
[6] Fenguangzhai Song. CD , 1992 .
[7] Arobinda Gupta,et al. Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey , 2010 .
[8] Guy Pujolle,et al. Requirements for survivable routing in MANETs , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[9] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[10] Geng Peng,et al. Routing Attacks and Solutions in Mobile Ad hoc Networks , 2006, 2006 International Conference on Communication Technology.
[11] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[12] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[13] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[14] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[15] Nancy R. Mead,et al. Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[16] Abdullah Saad Al Shahrani. Rushing Attack in Mobile Ad Hoc Networks , 2011, INCoS.
[17] Mohammad S. Obaidat,et al. Fault and intrusion tolerance in wireless ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[18] Zygmunt J. Haas,et al. Path selection algorithms in homogeneous mobile ad hoc networks , 2006, IWCMC '06.
[19] Reza Curtmola,et al. On the Survivability of Routing Protocols in Ad Hoc Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[20] Z. Hasan. A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .
[21] J. Bonney,et al. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[22] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[23] Vrinda Tokekar,et al. Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[24] Uyen Trang Nguyen,et al. Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[25] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[26] Romit Roy Choudhury,et al. Survivability Analysis of Ad Hoc Wireless Network Architecture , 2000, Mobile and Wireless Communication Networks.
[27] George K. Papageorgiou,et al. Cross-Layered Security Analysis of Wireless Ad Hoc Networks , 2004 .
[28] J.J. Garcia-Luna-Aceves,et al. An end-to-end solution for secure and survivable routing in MANETs , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.