A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[2] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[3] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[4] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[5] Sugata Sanyal,et al. Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks , 2004, IWDC.
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.