Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks
暂无分享,去创建一个
[1] Chris McDonald,et al. A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks , 2003 .
[2] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[3] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[7] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[8] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[9] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[10] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[11] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[14] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[15] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[16] V. Park,et al. An Internet MANET Encapsulation Protocol (IMEP) Specification , 1998 .
[17] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[18] Vincent Park,et al. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .
[19] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[20] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[21] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[22] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[23] Dimitri P. Bertsekas,et al. Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently Changing Topology , 1981, IEEE Trans. Commun..
[24] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[25] Anthony Ephremides,et al. A distributed routing algorithm for mobile wireless networks , 1995, Wirel. Networks.