Secure multicast routing protocols in mobile ad‐hoc networks
暂无分享,去创建一个
[1] Shakil Akhtar,et al. Mobility and Load Analysis of DSDV and DSR Mobile Ad hoc Routing Protocols , 2010, ICWN.
[2] Cheng-Chi Lee,et al. Mobile device integration of a fingerprint biometric remote authentication scheme , 2012, Int. J. Commun. Syst..
[3] Ahmed. M. Abdel Mo'men,et al. New attacks and efficient countermeasures for multicast AODV , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.
[4] Mohamed F. Younis,et al. Wireless ad hoc networks: technologies and challenges , 2006, Wirel. Commun. Mob. Comput..
[5] Phillip G. Bradford,et al. Foundations of Security for Hash Chains in Ad Hoc Networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[7] Sushil Jajodia,et al. Securing MAODV: attacks and countermeasures , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[8] LeeCheng-Chi,et al. Mobile device integration of a fingerprint biometric remote authentication scheme , 2012 .
[9] Xiaohua Jia,et al. QoS multicast routing in cognitive radio ad hoc networks , 2012, Int. J. Commun. Syst..
[10] Chun-Chuan Yang,et al. Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks , 2007, Comput. Commun..
[11] Ruey-Maw Chen,et al. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions , 2012, Int. J. Commun. Syst..
[12] Lazaros F. Merakos,et al. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.
[13] Xiaohua Jia,et al. QoS multicast routing by using multiple paths/trees in wireless ad hoc networks , 2007, Ad Hoc Networks.
[14] Michel Kadoch,et al. Multicast Routing Protocols in Mobile Ad Hoc Networks: A Comparative Survey and Taxonomy , 2009, EURASIP J. Wirel. Commun. Netw..
[15] T. Aurisch. Optimization techniques for military multicast key management , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[16] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[17] Christos Politis,et al. Securing AODV against wormhole attacks in emergency MANET multimedia communications , 2009, MobiMedia.
[18] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[19] Xue Liu,et al. Research on multicast routing protocols for mobile ad-hoc networks , 2008, Comput. Networks.
[20] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[21] Tobias Ginzler,et al. SEAMAN : A Security-Enabled Anonymous MANET Protocol , 2008 .
[22] Alexander Tiderko,et al. A framework for multicast and quality based forwarding in manets , 2005, Communications and Computer Networks.
[23] Antonio F. Gómez-Skarmeta,et al. Security Extensions to MMARP Through Cryptographically Generated Addresses , 2005, GI Jahrestagung.
[24] Chun Chen,et al. Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..
[25] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[26] Ahmed. M. Abdel Mo'men,et al. A survey on security enhanced multicast routing protocols in Mobile Ad hoc Networks , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.
[27] Shaya Sheikh,et al. Mobile ad hoc network broadcasting: A multi‐criteria approach , 2011, Int. J. Commun. Syst..
[28] Angelos D. Keromytis,et al. Securing MANET Multicast Using DIPLOMA , 2010, IWSEC.
[29] Reza Curtmola,et al. BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.
[30] Niyazi Odabasioglu,et al. Performance of joint multilevel/AES‐LDPCC‐CPFSK schemes over wireless sensor networks , 2010, Int. J. Commun. Syst..
[31] Dharma P. Agrawal,et al. Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[32] Zhiming Xu,et al. A Reliable Multicast Routing Protocol for High-speed Mobile Ad Hoc Networks: R-ODMRP , 2010, J. Softw..
[33] Michalis Faloutsos,et al. Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol , 2006, Ad Hoc Networks.
[34] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[35] David Thaler,et al. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.
[36] Peter Thorsteinson,et al. NET Security and Cryptography , 2003 .
[37] Hung-Yu Chien,et al. Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..
[38] Young-Chul Shim. A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes , 2006, ICCSA.
[39] Mohamed Younis,et al. Wireless ad hoc networks: technologies and challenges: Editorials , 2006 .
[40] V. Palanisamy,et al. Security in Multicast Routing in Ad Hoc Network , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[41] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[42] G. Padmavathi,et al. Dynamic Clustering for QoS based Secure Multicast Key Distribution in Mobile Ad Hoc Networks , 2010 .
[43] Rajmohan Rajaraman,et al. Topology control and routing in ad hoc networks: a survey , 2002, SIGA.
[44] Haïdar Safa,et al. A load balancing energy efficient clustering algorithm for MANETs , 2010, Int. J. Commun. Syst..
[45] Refik Molva,et al. Security in wireless ad hoc networks , 2003 .
[46] Sahadeo Padhye,et al. A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..
[47] Guevara Noubir,et al. Secure multicast groups on ad hoc networks , 2003, SASN '03.
[48] D Suganyadevi. Dynamic clustering for reliable QoS based secure muticast key distribution in mobile Ad Hoc networks , 2010 .
[49] Yuh-Min Tseng,et al. Towards generalized ID-based user authentication for mobile multi-server environment , 2012, Int. J. Commun. Syst..
[50] Idress Skloul Ibrahim,et al. A {DSDV}-based Multipath Routing Protocol for mobile Ad-hoc Networks , 2007 .
[51] Ezedin Barka,et al. OMAC: A new access control architecture for overlay multicast communications , 2011, Int. J. Commun. Syst..
[52] Charles E. Perkins,et al. Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .
[53] Mohammad Dakhilalian,et al. Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors , 2012, Int. J. Commun. Syst..
[54] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.