Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
暂无分享,去创建一个
[1] JianHua Song,et al. A reputation-based scheme against malicious packet dropping for mobile ad hoc networks , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[2] Djamel Djenouri,et al. Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks , 2006, IWSOS/EuroNGI.
[3] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[4] Sajal K. Das,et al. Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.
[5] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[7] Michael Schneider,et al. Merkle Tree Traversal Revisited , 2008, PQCrypto.
[8] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[9] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[10] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[11] S. Sharma,et al. Simulation Study Of Blackhole Attack in the Mobile Ad hoc Networks ” , 2008 .
[12] Djamel Djenouri,et al. Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .
[13] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[14] Djamel Djenouri,et al. On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.
[15] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[17] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[18] Jamal N. Al-Karaki,et al. Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..
[19] Evangelos Kranakis,et al. Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.
[20] Jung-Shian Li,et al. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..
[21] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[22] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[23] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[24] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[25] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[26] Soufiene Djahel,et al. An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.