On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network☆
暂无分享,去创建一个
[1] Yi Mu,et al. Securing wireless mesh networks with ticket-based authentication , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.
[2] Letha H. Etzkorn,et al. Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004 , 2004, ACM Southeast Regional Conference.
[3] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[4] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[5] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[6] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[7] Jaydip Sen,et al. Secure Routing in Wireless Mesh Networks , 2011, ArXiv.
[8] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[9] G. S. Mamatha,et al. Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .
[10] Jaydip Sen,et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[11] C. Siva Ram Murthy,et al. An Introduction to Wireless Mesh Networks , 2008 .
[12] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[13] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.