Security Vulnerabilities in Ad Hoc Networks
暂无分享,去创建一个
[1] Thomas Clausen,et al. The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .
[2] Wayne E. Stark,et al. Frequency-hopped spread spectrum in the presence of a follower partial-band jammer , 1993, IEEE Trans. Commun..
[3] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[4] Xiaoyan Hong,et al. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[5] Yu-Chee Tseng,et al. Location Awareness in Ad Hoc Wireless Mobile Networks , 2001, Computer.
[6] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[7] Xiaoyan Hong,et al. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 1988, MobiHoc.
[8] Richard G. Ogier,et al. A reliable, efficient topology broadcast protocol for dynamic networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[9] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .
[10] Charles E. Perkins,et al. The Ad Hoc on-demand distance-vector protocol , 2001 .
[11] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[12] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[13] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[14] Zygmunt J. Haas,et al. ZRP: a hybrid framework for routing in Ad Hoc networks , 2001 .
[15] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Zygmunt J. Haas,et al. The performance of query control schemes for the zone routing protocol , 1998, SIGCOMM '98.
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[18] Mario Gerla,et al. Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.