Reliable operational services in MANETs by misbehavior-tolerant quorum systems
暂无分享,去创建一个
Michele Nogueira Lima | Aldri Luiz dos Santos | M. N. Lima | Elisa Mannes | A. Santos | Elisa Mannes
[1] Michele Nogueira Lima,et al. Implications of misbehaving attacks on probabilistic quorum system for MANETs , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[2] Sneha Kumar Kasera,et al. Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[3] Lixia Zhang,et al. A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.
[4] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[5] Patrick Th. Eugster,et al. PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems , 2003, MobiHoc '03.
[6] Michele Nogueira Lima,et al. A bio-inspired scheme on quorum systems for reliable services data management in MANETs , 2012, 2012 IEEE Network Operations and Management Symposium.
[7] João Leitão,et al. Epidemic Broadcast Trees , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[8] Avishai Wool,et al. Probabilistic Byzantine quorum systems , 1998, PODC '98.
[9] Turgay Korkmaz,et al. HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[10] Serge Fdida,et al. Research challenges towards the Future Internet , 2011, Comput. Commun..
[11] Yih-Chun Hu,et al. Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[12] Qing Li,et al. Data Caching in Selfish MANETs , 2005, ICCNMC.
[13] Peidong Zhu,et al. An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network , 2007, APNOMS.
[14] Daniela Tulone. Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems , 2007, Ad Hoc Networks.
[15] Kenji Leibnitz,et al. Biological principles for future internet architecture design , 2011, IEEE Communications Magazine.
[16] Yasushi Saito,et al. Optimistic replication , 2005, CSUR.
[17] Yuguang Fang,et al. Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[18] John Lane,et al. Byzantine replication under attack , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[19] Yi Mu,et al. Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks , 2005, EUC Workshops.
[20] Jörg Hähner,et al. Usenet-on-the-fly - Supporting Locality of Information in Spontaneous Networking Environments , 2003 .