The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Ness B. Shroff,et al. Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[2] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[3] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[4] Stephan Olariu,et al. A two-zone hybrid routing protocol for mobile ad hoc networks , 2004, IEEE Transactions on Parallel and Distributed Systems.
[5] Roberto Di Pietro,et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.
[6] Naohiro Hayashibara,et al. Failure detectors for large-scale distributed systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[7] Reza Curtmola,et al. A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks , 2007, Electron. Notes Theor. Comput. Sci..
[8] Christian Bettstetter. Topology properties of Ad hoc networks with random waypoint mobility , 2003, MOCO.
[9] Jun Luo,et al. Joint mobility and routing for lifetime elongation in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Christophe Diot,et al. CRAWDAD dataset cambridge/haggle (v.2006-01-31) , 2006 .
[11] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[12] Jorma T. Virtamo,et al. Spatial node distribution of the random waypoint mobility model with applications , 2006, IEEE Transactions on Mobile Computing.
[13] Pan Hui,et al. CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .
[14] Sushil Jajodia,et al. Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[15] John S. Baras,et al. A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET , 2006, 2006 IEEE International Conference on Communications.
[16] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[17] Hai Liu,et al. A Distributed and Efficient Flooding Scheme Using 1-Hop Information in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[18] Roberto Di Pietro,et al. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.
[19] Julinda Stefa,et al. SWIM: A Simple Model to Generate Small Mobile Worlds , 2008, IEEE INFOCOM 2009.
[20] E. Coyle,et al. Stochastic Properties of Mobility Models in Mobile Ad Hoc Networks , 2006 .
[21] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[22] Martin Vetterli,et al. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Sushil Jajodia,et al. Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures , 2005 .
[24] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[25] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).