Scenario based evaluation of the impact of misbehaving nodes in Mobile Ad hoc Networks
暂无分享,去创建一个
[1] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[2] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[3] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[4] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[5] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[6] Zygmunt J. Haas,et al. Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[7] Xiaoyan Hong,et al. A wireless hierarchical routing protocol with group mobility , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[8] Marco Conti,et al. Multihop Ad Hoc Networking: The Reality , 2007, IEEE Communications Magazine.
[9] Marco Conti,et al. Multihop Ad Hoc Networking: The Theory , 2007, IEEE Communications Magazine.
[10] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[11] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[12] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[13] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[14] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..