Secure Routing for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[2] Chris J. Mitchell,et al. Security Vulnerabilities in Ad Hoc Networks , 2003 .
[3] Ingrid Moerman,et al. An overview of mobile ad hoc networks: applications and challenges , 2004 .
[4] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[5] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[6] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[7] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[8] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[9] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[10] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[11] Zygmunt J. Haas,et al. The performance of query control schemes for the zone routing protocol , 1998, SIGCOMM '98.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[14] Liang Qin,et al. Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design , 2004 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[17] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[18] Ralph E. Droms,et al. Dynamic Host Configuration Protocol , 1993, RFC.
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[21] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[22] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[23] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[24] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[25] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[26] Zygmunt J. Haas,et al. The Interzone Routing Protocol (IERP) for Ad Hoc Networks , 2002 .
[27] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[28] Chai-Keong Toh,et al. Associativity-Based Routing for Ad Hoc Mobile Networks , 1997, Wirel. Pers. Commun..
[29] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[31] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[32] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[33] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[34] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[35] James H. Burrows,et al. Secure Hash Standard , 1995 .
[36] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[37] Carlisle Adams,et al. Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API , 1999 .
[38] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.