Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms
暂无分享,去创建一个
[1] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[2] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[3] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[4] Ronggong Song,et al. Secure dynamic distributed routing algorithm for ad hoc wireless networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[5] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[6] Seung Yi,et al. A Security-Aware Routing Protocol for Wireless Ad Hoc Networks , 2002 .
[7] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[8] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[9] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[10] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[11] A.A. Pirzada,et al. Secure Routing with the AODV Protocol , 2005, 2005 Asia-Pacific Conference on Communications.
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[13] Azzedine Boukerche,et al. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[14] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.