Requirements for survivable routing in MANETs
暂无分享,去创建一个
[1] Dipak Ghosal,et al. Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.
[2] Reza Curtmola,et al. On the Survivability of Routing Protocols in Ad Hoc Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[3] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[4] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[5] Nancy R. Mead,et al. Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[6] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[7] Yves Deswarte,et al. Internet Security: An Intrusion-Tolerance Approach , 2006, Proceedings of the IEEE.
[8] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[9] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[10] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[11] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[12] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[13] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[14] Reza Curtmola,et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .
[15] Andrew T. Campbell,et al. Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN) , 2002, IEEE Trans. Mob. Comput..
[16] Guy Pujolle,et al. Survival multipath routing for MANETs , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[17] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[18] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[19] Panayiotis Kotzanikolaou,et al. SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.
[20] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.