A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Strategies for enhancing routing security in protocols for mobile ad hoc networks , 2003, J. Parallel Distributed Comput..
[2] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[3] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[4] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[5] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[6] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[7] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[8] R. Ramanujan,et al. Intrusion-resistant ad hoc wireless networks , 2002, MILCOM 2002. Proceedings.
[9] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[10] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[11] Peng Wei-gang. Routing Protocol in Mobile Ad Hoc Networks , 2002 .
[12] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[13] Xiaoyan Hong,et al. Scalable routing protocols for mobile ad hoc networks , 2002, IEEE Netw..
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.