暂无分享,去创建一个
[1] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[2] C. V. Raman,et al. Performance analysis of Dynamic MANET On- demand (DYMO) Routing protocol , 2010 .
[3] Sylvie Perreau,et al. A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Toyoo Takata,et al. An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[6] Mario Gerla. Landmark Routing Protocol (LANMAR) for Large Scale Ad Hoc Networks , 2002 .
[7] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[8] Vijay Varadharajan,et al. Fellowship: Defense against Flooding and Packet Drop Attacks in MANET , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[9] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[10] Rajendra V. Boppana,et al. Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[11] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[12] Atul Garg,et al. Improving Throughput and Delay of Secure Ad hoc on-Demand Distance Vector Routing (SAODV) , 2014 .
[13] Thomas Clausen,et al. The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .
[14] Debdutta Barman Roy,et al. Prevention of sleep deprivation attacks using clustering , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[15] Fred L. Templin,et al. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.
[16] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[17] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[18] Pascal Lorenz,et al. A Cross layer Admission Control On-demand Routing Protocol for QoS Applications , 2006 .
[19] M. Pushpalatha,et al. Performance Analysis of Flooding Attack Prevention Algorithm in MANETs , 2009 .
[20] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[21] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[22] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[23] André Schiper,et al. Probabilistic broadcast for flooding in wireless mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[24] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.