Validation of the OLSR routing table based on trust reasoning
暂无分享,去创建一个
[1] Niki Pissinou,et al. Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[3] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[4] M. Sloman,et al. A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .
[5] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Rafael Timóteo de Sousa Júnior,et al. Analysis of the implicit trust within the OLSR protocol , 2007, IFIPTM.
[7] Ricardo Staciarini Puttini,et al. A fully distributed IDS for MANET , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[8] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[9] Raquel Lacuesta Gilaberte,et al. A secure routing protocol for ad hoc networks based on trust , 2007, International Conference on Networking and Services (ICNS '07).
[10] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[11] Rafael Timóteo de Sousa Júnior,et al. Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[13] M. Wang,et al. An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[14] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[15] Synnøve Marie Vik,et al. THE POLITICS OF NATURE , 2009 .
[16] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[17] Donald B. Johnson,et al. A Note on Dijkstra's Shortest Path Algorithm , 1973, JACM.
[18] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .