A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks
暂无分享,去创建一个
Panganamala Ramana Kumar | Yih-Chun Hu | Jonathan Ponniah | P. Kumar | Yih-Chun Hu | Jonathan Ponniah
[1] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[2] P. R. Kumar,et al. Power Control in Ad-Hoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol , 2002 .
[3] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[7] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[9] Naomi Ehrich Leonard,et al. IEEE Transactions on Control of Network Systems , 2018, IEEE Transactions on Control of Network Systems.
[10] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[11] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[12] Panganamala Ramana Kumar,et al. A Clean Slate Approach to Secure Wireless Networking , 2015, Found. Trends Netw..
[13] Frank Kelly,et al. Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..
[14] Danny Dolev,et al. On the possibility and impossibility of achieving clock synchronization , 1984, STOC '84.
[15] Yih-Chun Hu,et al. An orthogonal multiple access coding scheme , 2012, Commun. Inf. Syst..
[16] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[17] Panganamala Ramana Kumar,et al. A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking , 2016, IEEE Transactions on Control of Network Systems.
[18] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[19] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[20] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[21] R. Srikant,et al. A tutorial on cross-layer optimization in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] Jihyuk Choi,et al. Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks , 2010, SecureComm.