A survey of secure mobile Ad Hoc routing protocols
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[3] Atsushi Iwata,et al. Scalable routing strategies for ad hoc wireless networks , 1999, IEEE J. Sel. Areas Commun..
[4] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[7] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[8] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[9] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[10] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[11] Seung Yi,et al. A Security-Aware Routing Protocol for Wireless Ad Hoc Networks , 2002 .
[12] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[13] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[14] Dorothy E. Denning,et al. A new paradigm for trusted systems , 1993, NSPW '92-93.
[15] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[16] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..
[17] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[18] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[19] David A. Maltz,et al. Resource Management in Multi-hop Ad Hoc Networks , 1999 .
[20] Satish K. Tripathi,et al. Signal stability-based adaptive routing (SSA) for ad hoc mobile networks , 1997, IEEE Wirel. Commun..
[21] J. J. Garcia-Luna-Aceves,et al. An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..
[22] Mario Joa-Ng,et al. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[23] Yih-Chun Hu,et al. Securing quality-of-service route discovery in on-demand routing for ad hoc networks , 2004, SASN '04.
[24] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[25] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[26] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[27] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[28] Ivan Stojmenovic,et al. Ad hoc Networking , 2004 .
[29] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[30] Mario Gerla,et al. Global state routing: a new routing scheme for ad-hoc wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[31] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[32] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[33] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[34] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[35] Mohsen Guizani,et al. NIS01-4: Trust Aware Routing in Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.
[36] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[37] Loay Abusalah,et al. TARP Performance in a Mobile World , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[38] Gene Tsudik,et al. Lowering security overhead in link state routing , 1999, Comput. Networks.
[39] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[40] Dogan Kesdogan,et al. Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.
[41] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[42] Leszek Lilien. Developing Pervasive Trust Paradigm for Authentication and Authorization , 2003 .
[43] Mario Gerla,et al. IPv6 flow handoff in ad hoc wireless networks using mobility prediction , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[44] Thomas Clausen,et al. The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .
[45] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[46] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[47] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[48] Loay Abusalah,et al. TARP: trust-aware routing protocol , 2006, IWCMC '06.
[49] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[50] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[51] Bharat K. Bhargava,et al. Authorization Based on Evidence and Trust , 2002, DaWaK.
[52] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[53] W. Richard Stevens,et al. TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms , 1997, RFC.
[54] ZapataManel Guerrero. Secure ad hoc on-demand distance vector routing , 2002 .
[55] J. J. Garcia-Luna-Aceves,et al. Source-tree routing in wireless networks , 1999, Proceedings. Seventh International Conference on Network Protocols.
[56] J. J. Garcia-Luna-Aceves,et al. Solutions to hidden terminal problems in wireless networks , 1997, SIGCOMM '97.
[57] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[58] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[59] Chai-Keong Toh,et al. Associativity-Based Routing for Ad Hoc Mobile Networks , 1997, Wirel. Pers. Commun..
[60] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.