On vulnerability and protection of ad hoc on-demand distance vector protocol
暂无分享,去创建一个
Bharat Bhargava | Yi Lu | Weichao Wang | B. Bhargava | Weichao Wang | Yi Lu
[1] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[2] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[3] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[4] Dharma P. Agrawal,et al. Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[5] C C. Chiang,et al. Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .
[6] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[7] Tracy Camp,et al. Performance comparison of two location based routing protocols for ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[8] Mahesh K. Marina,et al. On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[10] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[11] Bharat Bhargava,et al. Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks , 2002 .
[12] J. J. Garcia-Luna-Aceves,et al. An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..
[13] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[14] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[15] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[16] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[17] Vaduvur Bharghavan,et al. Enhancing ad hoc routing with dynamic virtual infrastructures , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[18] Bharat K. Bhargava,et al. Authorization Based on Evidence and Trust , 2002, DaWaK.
[19] J. Bonney,et al. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[20] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[21] Vaduvur Bharghavan. Secure wireless LANs , 1994, CCS '94.
[22] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[23] Anthony Ephremides,et al. A distributed routing algorithm for mobile radio networks , 1989, IEEE Military Communications Conference, 'Bridging the Gap. Interoperability, Survivability, Security'.
[24] Bharat Bhargava,et al. On vulnerability and protection of AODV , 2002 .
[25] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[26] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.