SPREAD: Improving network security by multipath routing in mobile ad hoc networks
暂无分享,去创建一个
Yuguang Fang | Wenjing Lou | Yanchao Zhang | Wei Liu | Yuguang Fang | Wei Liu | Yanchao Zhang | W. Lou | Wenjing Lou
[1] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[2] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[3] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[4] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[5] Yuguang Fang,et al. A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[7] Panagiotis Papadimitratos,et al. Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.
[8] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[9] Ding-Zhu Du,et al. Ad Hoc Wireless Networking , 2004, Network Theory and Applications.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Klara Nahrstedt,et al. An overview of quality of service routing for next-generation high-speed networks: problems and solutions , 1998, IEEE Netw..
[13] Janelle J. Harms,et al. Performance study of a multipath routing method for wireless mobile ad hoc networks , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[14] Yuguang Fang,et al. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .
[15] J. W. Suurballe. Disjoint paths in a network , 1974, Networks.
[16] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[17] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[19] Yuguang Fang,et al. Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks , 2002, Wirel. Networks.
[20] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[21] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[22] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[23] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[24] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[25] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[26] Ramesh Bhandari. Survivable Networks: Algorithms for Diverse Routing , 1998 .
[27] LeeWenke,et al. Intrusion detection techniques for mobile wireless networks , 2003 .
[28] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[29] Zygmunt J. Haas,et al. On the impact of alternate path routing for load balancing in mobile ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[30] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[31] Zygmunt J. Haas,et al. Analysis of multipath routing, part 2: mitigation of the effects of frequently changing network topologies , 2004, IEEE Transactions on Wireless Communications.
[32] Adi Shamir,et al. How to share a secret , 1979, CACM.
[33] Yuguang Fang,et al. Spread: improving network security by multipath routing , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[34] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[35] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[36] Tzong-Chen Wu,et al. Cheating detection and cheater identification in secret sharing schemes , 1995 .
[37] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[38] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[39] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[40] Robert E. Tarjan,et al. A quick method for finding shortest pairs of disjoint paths , 1984, Networks.
[41] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[42] Zygmunt J. Haas,et al. Analysis of multipath Routing-Part I: the effect on the packet delivery ratio , 2004, IEEE Transactions on Wireless Communications.