Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks
暂无分享,去创建一个
[1] C. Politis,et al. A Test-bed Implementation for Securing Olsr in Mobile Ad-hoc Networks , 2010 .
[2] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[3] David Thaler,et al. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.
[4] Bharat Bhargava,et al. Defending against Collaborative Packet Drop Attacks on MANETs , 2009 .
[5] Robert G. Prinz,et al. Optimal multi-topology routing for IP resilience , 2006 .
[6] Andrew Adams,et al. Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol Specification (Revised) , 2005, RFC.
[7] Richard G. Ogier,et al. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding , 2009, RFC.
[8] Thomas H. Clausen,et al. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.
[9] Deep Medhi,et al. Using Multi-Topology Routing to improve routing during geographically correlated failures , 2014, 2014 10th International Conference on the Design of Reliable Communication Networks (DRCN).
[10] Abhay Roy,et al. Multi-Topology (MT) Routing in OSPF , 2007, RFC.
[11] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[12] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[13] Todd R. Andel,et al. Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.
[14] Gary Scott Malkin,et al. RIP Version 2 , 1998, RFC.
[15] Bu-Sung Lee,et al. CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.
[16] J.P. Macker,et al. Simplified multicast forwarding in mobile ad hoc networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[17] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[18] Shyhtsun Felix Wu,et al. On the vulnerabilities and protection of OSPF routing protocol , 1998, Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226).
[19] Jon Andersson,et al. Multi-topology routing for improved network resource utilization in mobile tactical networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[20] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[21] Tarik Cicic. On basic properties of fault-tolerant multi-topology routing , 2008, Comput. Networks.
[22] A. Hansen,et al. Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks , 2006 .
[23] Christos Politis,et al. A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks , 2010, ArXiv.
[24] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[25] Thomas H. Clausen,et al. Optimized Link State Routing Protocol Version 2 (OLSRv2) and MANET Neighborhood Discovery Protocol (NHDP) Extension TLVs , 2014, RFC.
[26] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[27] P. Jacquet,et al. Securing the OLSR protocol , 2003 .
[28] Stein Gjessing,et al. Fast IP Network Recovery Using Multiple Routing Configurations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[29] Philippe Jacquet,et al. OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks , 2009, RFC.
[30] S. Gjessing,et al. Multiple Routing Configurations for Fast IP Network Recovery , 2009, IEEE/ACM Transactions on Networking.
[31] M. Menth,et al. Network resilience through multi-topology routing , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..
[32] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[33] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[34] Rafael Timóteo de Sousa Júnior,et al. Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.
[35] Ritu Chadha,et al. Reliability estimation in mobile ad hoc networks , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).