BHQRSM: Binary Hex Quadratic Residue Security Model to Enhance the Trust in MANETs
暂无分享,去创建一个
[1] Nai-Wei Lo,et al. A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .
[2] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Palaniandavar Venkateswaran,et al. Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks , 2011 .
[4] Seyed Reza Kamel,et al. AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS , 2014 .
[5] Z. A. Khan,et al. Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.
[6] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[7] Syed Jalal Ahmad,et al. Location aware and energy efficient routing protocol for long distance MANETs , 2013, Int. J. Netw. Virtual Organisations.
[8] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[9] Sanjay Keer,et al. To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[10] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.
[11] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[12] Pallavi Kaliyar,et al. A secure routing protocol for MANETs against byzantine attacks , 2013 .
[13] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[14] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[15] S. S. Tyagi. Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .
[16] Yang Lu,et al. Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .
[17] Yanbin Liu,et al. Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[18] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[19] Bin Yu,et al. The three-layered group key management architecture for MANET , 2009, 2009 11th International Conference on Advanced Communication Technology.
[20] S. C. Sharma,et al. A Highly Secured Approach against Attacks in MANETS , 2010 .
[21] Y. Jay Guo,et al. Statistical NLOS Identification Based on AOA, TOA, and Signal Strength , 2009, IEEE Transactions on Vehicular Technology.
[22] Kamalrulnizam Abu Bakar,et al. A trust aware routing protocol for energy constrained wireless sensor network , 2016, Telecommun. Syst..
[23] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[25] Wu Yue,et al. Distributed intrusion detection for mobile ad hoc networks , 2008 .
[26] S. Radha,et al. A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[27] Deepika Kukreja,et al. Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..
[28] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[29] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[30] V. Balakrishnan,et al. Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks , 2007, 2007 4th International Symposium on Wireless Communication Systems.
[31] Manju Khari,et al. Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey , 2012 .
[32] Panayiotis Kotzanikolaou,et al. Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[33] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[34] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[35] Rana Sanjeev,et al. Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication , 2011 .
[36] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.