Secure Routing for Wireless Mesh Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Marco Conti,et al. Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.
[3] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[4] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Michael Bahr,et al. Proposed routing for IEEE 802.11s WLAN mesh networks , 2006, WICON '06.
[7] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[8] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[9] Mihail L. Sichitiu. WIRELESS MESH NETWORKS : OPPORTUNITIES AND CHALLENGES , 2005 .
[10] Xiangpeng Jing,et al. Energy-Aware Algorithms for AODV in Ad Hoc Networks , .
[11] Men Long,et al. Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information , 2006, IEEE Transactions on Industrial Informatics.
[12] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[13] Hossam S. Hassanein,et al. Routing with load balancing in wireless Ad hoc networks , 2001, MSWIM '01.
[14] Shouhuai Xu,et al. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[15] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[16] I.D. Chakeres,et al. The utility of hello messages for determining link connectivity , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.
[17] Choong Seon Hong,et al. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.
[18] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[19] Vincent W. S. Wong,et al. Experimental comparisons between SAODV and AODV routing protocols , 2005, WMuNeP '05.