On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust
暂无分享,去创建一个
[1] Chris Hankin,et al. A framework for security analysis of mobile wireless networks , 2006, Theor. Comput. Sci..
[2] Lik Mui,et al. Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .
[3] Sonja Buchegger,et al. Coping With Misbehavior in Mobile Ad-hoc Networks , 2004 .
[4] M. Wang,et al. An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[5] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .
[6] Christian Damsgaard Jensen,et al. Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.
[7] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[8] Pietro Michiardi,et al. Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .
[9] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[10] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[11] Laurent Bussard. Trust establishment protocols for communicating devices , 2004 .
[12] Donald B. Johnson,et al. A Note on Dijkstra's Shortest Path Algorithm , 1973, JACM.
[13] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[14] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Khaldoun Al Agha,et al. A shared secret-based algorithm for securing the OLSR routing protocol , 2006, Telecommun. Syst..
[16] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[17] Anis Laouiti,et al. Securing the OLSR routing protocol with or without compromised nodes in the network , 2005 .
[18] Lea Viljanen,et al. Towards an Ontology of Trust , 2005, TrustBus.