An Effective Double Acknowldgement Scheme for Intrusion Detection in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[2] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.
[3] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[4] Khaldoun Al Agha,et al. Which Wireless Technology for Industrial Wireless Sensor Networks? The Development of OCARI Technology , 2009, IEEE Transactions on Industrial Electronics.
[5] Geetha Jayakumar,et al. Ad Hoc Mobile Wireless Networks Routing Protocols - A Review , 2007 .
[6] Sugata Sanyal,et al. Mobile Ad Hoc Network Security , 2009 .
[7] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[8] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[9] Luca Benini,et al. Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.
[10] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.