Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication
暂无分享,去创建一个
[1] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[2] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[3] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[4] Gene Tsudik,et al. SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[5] Pietro Michiardi,et al. Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[8] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[9] Nei Kato,et al. Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.
[10] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[11] Pietro Michiardi,et al. Preventing denial of service and selfishness in ad hoc networks , 2002 .
[12] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[13] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[14] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.