An advanced signature system for OLSR
暂无分享,去创建一个
[1] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[2] A. Laouiti,et al. Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[3] Tuomas Aura,et al. Using conservation of flow as a security mechanism in network protocols , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[5] John Moy,et al. OSPF Version 2 , 1998, RFC.
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[8] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[9] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[10] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[11] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[12] Sondre Wabakken Engell. Securing the OLSR Protocol , 2004 .
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[15] P. Jacquet,et al. Securing the OLSR protocol , 2003 .
[16] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[17] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[18] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[19] Fred L. Templin,et al. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.
[20] Anis Laouiti,et al. Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .
[21] Philippe Jacquet,et al. Investigating the impact of partial topology in proactive MANET routing protocols , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.
[22] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[23] John Moy,et al. OSPF Version 2 , 1998, RFC.
[24] Ricardo Staciarini Puttini,et al. Certification and Authentication Services for Securing MANET Routing Protocols , 2003, MWCN.
[25] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[26] Brian Wellington,et al. OSPF with Digital Signatures , 1997, RFC.
[27] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.