Defending against wormhole attack in OLSR
暂无分享,去创建一个
Hong Liang | Hong Fan | Fu Cai
[1] Patrick D. McDaniel,et al. On context in authorization policy , 2003, SACMAT '03.
[2] William E. Johnston,et al. Authorization and attribute certificates for widely distributed access control , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[3] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[4] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[5] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[6] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[7] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[8] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[9] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[10] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[12] Heping Hu,et al. A scheme for authentication and authorization in a grid application , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[13] Emil C. Lupu,et al. A policy based role object model , 1997, Proceedings First International Enterprise Distributed Object Computing Workshop.
[14] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.