The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Kefei Chen,et al. Efficient Link Layer Security Scheme for Wireless Sensor Networks ? , 2007 .
[2] Li Zhao,et al. MARS: Misbehavior Detection in Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[3] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[4] Syed Rehan Afzal,et al. RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[5] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Karl N. Levitt,et al. Distributed intrusion detection models for mobile ad hoc networks , 2006 .
[7] Stefan Fischer,et al. A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.
[8] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[9] S. Madhavi,et al. An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[10] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[11] Carlo Kopp,et al. A link layer security protocol for Suburban Ad-Hoc Networks , 2004 .
[12] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[13] N. Bhalaji,et al. Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks , 2009 .
[14] Yuguang Fang,et al. A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.
[15] Ernesto Jiménez Caballero. Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .
[16] Mihaela Cardei,et al. Routing Security in Ad Hoc Wireless Networks , 2010 .
[17] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[18] Anupam Joshi,et al. Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.
[19] S. Upadhyaya,et al. Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .