Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
暂无分享,去创建一个
[1] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[2] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[3] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[4] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[5] Partha Dasgupta,et al. Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[6] M. S. Corson,et al. Architectural considerations for mobile mesh networking , 1996, Proceedings of MILCOM '96 IEEE Military Communications Conference.
[7] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[8] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[9] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[10] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[11] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[12] Silvia Giordano,et al. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .
[13] Panagiotis Papadimitratos,et al. The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .
[14] Anthony Ephremides,et al. Distributed algorithm for efficient and interference-free broadcasting in radio networks , 1988, IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?.
[15] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[16] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[17] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[18] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[19] Partha Dasgupta,et al. On using reputations in ad hoc networks to counter malicious nodes , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..
[20] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[21] Juan-Carlos Cano,et al. Investigating performance of power-aware routing protocols for mobile ad-hoc networks , 2002, International Mobility and Wireless Access Workshop.
[22] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[23] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[24] Marco Conti,et al. Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.
[25] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[26] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[27] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[28] Bruce Schneier,et al. MODELING SECURITY THREATS , 1999 .
[29] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[30] S. Chakrabarti,et al. QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..
[31] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[32] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[33] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[34] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[35] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[36] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[37] Allen C. Sun. Design and implementation of fisheye routing protocol for mobile ad hoc networks , 2000 .
[38] André Schiper,et al. On the accuracy of MANET simulators , 2002, POMC '02.
[39] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[40] Mukesh Singhal,et al. A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks , 2004, ADHOC-NOW.
[41] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[42] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .