暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[3] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[4] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[5] Vijay Varadharajan,et al. Packet Drop Attack: A Serious Threat to Operational Mobile Ad hoc Networks , 2005 .
[6] Dr Pradip M. Jawandhiya. A Survey of Mobile Ad Hoc Network Attacks , 2019 .
[7] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[8] Ying Wang,et al. A method for security enhancements in AODV protocol , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[9] Prabha Ramachandran,et al. Limitations of on demand secure routing protocols , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[10] Sugata Sanyal,et al. An LSB Data Hiding Technique Using Prime Numbers , 2007, Third International Symposium on Information Assurance and Security.
[11] John Marshall,et al. An Analysis Of The Secure Routing Protocol For Mobile Ad Hoc Network Route Discovery: Using Intuitiv , 2003 .
[12] Marco Gruteser,et al. Detecting Identity Spoofs in 802 . 11 e Wireless Networks , 2009 .
[13] Futai Zou,et al. A Survey on Security in Wireless Mesh Networks , 2010 .
[14] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[15] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Sehun Kim,et al. A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks , 2007 .
[17] Sugata Sanyal,et al. A distributed security scheme for ad hoc networks , 2004, CROS.
[18] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[19] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[20] Guillermo Alonso Pequeño,et al. Extension to MAC 802.11 for performance improvement in MANET , 2007 .
[21] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[22] Alessandro Neri,et al. A Generalized Fibonacci LSB Data Hiding Technique , 2006 .
[23] Nei Kato,et al. A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006 .
[24] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[25] Preeti Nagrath,et al. Analyzing security of Authenticated Routing Protocol (ARAN) , 2010 .
[26] M. K. Soni,et al. A Comparative Study for Secure Routing in MANET , 2010 .
[27] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.
[28] Pramod Kumar Soni,et al. A Survey of Mobile Ad Hoc Network Attacks , 2013 .
[29] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[30] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[31] Davide Cerri,et al. Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.
[32] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[33] Levent Ertaul,et al. Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.
[34] V. Sankaranarayanan,et al. Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .
[35] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[36] Pla Uni,et al. Secure Routing for Mobile Ad hoc Networks , 2005 .
[37] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[38] Z. Hasan. A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .
[39] Security Scheme for ad-hoc Networks , 2005 .