Fine-Grained Analysis of Packet Loss in MANETs
暂无分享,去创建一个
Elisa Bertino | Daniele Midi | Majid Iqbal Khan | Muhammad Saleem Khan | E. Bertino | Daniele Midi | M. Khan | Muhammad Saleem Khan
[1] Won-Hyung Lee,et al. Load Balanced Congestion Adaptive Routing for Mobile Ad Hoc Networks , 2014, Int. J. Distributed Sens. Networks.
[2] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[3] K. Selvakumar,et al. Eaack- A Secure Intrusion Detection System for Manets , 2015 .
[4] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[5] Amandeep Amandeep,et al. Performance Analysis and Comparison of Scheduling Algorithm in MANET’s , 2011 .
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[9] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] Thomas Clausen,et al. Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .
[11] Bharat Bhargava,et al. Packet Loss in Mobile Ada Hoc Networks , 2003 .
[12] Ramon Sanchez-Iborra,et al. An Experimental QoE Performance Study for the Efficient Transmission of High Demanding Traffic over an Ad Hoc Network Using BATMAN , 2015, Mob. Inf. Syst..
[13] Philippe Jacquet,et al. Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .
[14] Zhihui,et al. A Load-based Queue Scheduling Algorithm for MANET , 2006 .
[15] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.
[16] Xiaoping Li,et al. Trust based routing mechanism for securing OSLR-based MANET , 2015, Ad Hoc Networks.
[17] Elisa Bertino,et al. Fine-grained analysis of packet losses in wireless sensor networks , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[18] Tarek R. Sheltami,et al. A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs , 2014, J. Ambient Intell. Humaniz. Comput..
[19] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[20] Farooq Anjum,et al. LiPaD: lightweight packet drop detection for ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[21] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[22] Thomas Kunz,et al. Mobility Metrics to Enable Adaptive Routing in MANET , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[23] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[24] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[25] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[26] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[27] Anupam Joshi,et al. On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[28] Ming Zhao,et al. Modeling and Analytical Study of Link Properties in Multihop Wireless Networks , 2012, IEEE Transactions on Communications.
[29] H. T. Mouftah,et al. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[30] George K. Papageorgiou,et al. Cross-Layered Security Analysis of Wireless Ad Hoc Networks , 2004 .
[31] Asaf Shabtai,et al. Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.
[32] Xiaoping Li,et al. A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.
[33] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[34] Stephen B. Wicker,et al. On the behavior of communication links of a node in a multi-hop mobile environment , 2004, MobiHoc '04.
[35] Chai Kiat Yeo,et al. Distributed Court System for intrusion detection in mobile ad hoc networks , 2011, Comput. Secur..
[36] Ashraf S. Hasan Mahmoud,et al. Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.