A secure routing protocol with node selfishness resistance in MANETs
暂无分享,去创建一个
[1] Xiaohua Jia,et al. QoS multicast routing by using multiple paths/trees in wireless ad hoc networks , 2007, Ad Hoc Networks.
[2] Yen-Ping Chu,et al. An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .
[3] Xiaojiang Du,et al. QoS routing based on multi-class nodes for mobile ad hoc networks , 2004, Ad Hoc Networks.
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Jian Wang,et al. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , 2006, Comput. Stand. Interfaces.
[7] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[8] Martin B. H. Weiss,et al. Analysis of mobile broadband competition: 3G vs. WiFi , 2010, Int. J. Mob. Commun..
[9] Min-Shiang Hwang,et al. An authentication protocol for low-cost RFID tags , 2011, Int. J. Mob. Commun..
[10] Sudip Misra,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..
[11] Dong-Hee Shin,et al. Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk , 2010, Int. J. Mob. Commun..
[12] Jalel Ben-Othman,et al. Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..
[13] Hussein Al-Bahadili,et al. Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs , 2011, Int. J. Netw. Secur..
[14] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[15] Marcus Stögbauer. Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .
[16] Hwangjun Song,et al. Secure Route Discovery Protocol for Ad Hoc Networks , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[17] Hsung-Pin Chang,et al. A hybrid efficient routing protocol for sink-oriented ad hoc sensor networks , 2009, Int. J. Mob. Commun..
[18] Olivier Festor,et al. Group Key Management in MANETs , 2008, Int. J. Netw. Secur..
[19] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[20] Chun-Ta Li,et al. An electronic voting protocol with deniable authentication for mobile ad hoc networks , 2008, Comput. Commun..
[21] Chansu Yu,et al. Uncertainty-aware Wireless Sensor Networks , 2009, Int. J. Mob. Commun..
[22] Yasser Kamal Hassan,et al. Performance Evaluation of Mobility Speed over MANET Routing Protocols , 2010, Int. J. Netw. Secur..
[23] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[24] Min-Shiang Hwang,et al. User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications , 2011, Int. J. Mob. Commun..
[25] Chun-Ta Li,et al. Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..
[26] Chun-Ta Li,et al. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..
[27] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[28] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[29] Ajay D. Kshemkalyani,et al. Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks , 2007, Int. J. Netw. Secur..
[30] Lei Guo,et al. Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.
[31] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..