A Secure and Power Efficient Routing Scheme for Ad Hoc Networks
暂无分享,去创建一个
[1] Philip Tavel,et al. Modeling and Simulation Design , 2011 .
[2] Michele Zorzi,et al. Energy efficiency of media access protocols for mobile data networks , 1998, IEEE Trans. Commun..
[3] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[4] Imrich Chlamtac,et al. Energy-conserving access protocols for identification networks , 1999, TNET.
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] William M. McEneaney,et al. Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming , 2012 .
[7] Phalguni Gupta,et al. A hybrid stable routing protocol for mobile ad hoc networks , 2009, 2009 Global Mobile Congress.
[8] S. M. Heemstra de Groot,et al. Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.
[9] P. Gupta,et al. Power Aware Virtual Node Routing Protocol for Ad hoc Networks , .
[10] Radia J. Perlman,et al. Fault-Tolerant Broadcast of Routing Information , 1983, Comput. Networks.
[11] Leandros Tassiulas,et al. Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[12] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[13] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[14] Phalguni Gupta,et al. Secured Routing Scheme for Adhoc Networks , 2009 .
[15] Teresa H. Meng,et al. Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[16] Piyush Gupta,et al. Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[18] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[19] Pla Uni,et al. Secure Routing for Mobile Ad hoc Networks , 2005 .
[20] Marcel Worring,et al. NIST Special Publication , 2005 .
[21] Deborah Estrin,et al. Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks , 2000 .
[22] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[23] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[24] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[25] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[26] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[27] Phalguni Gupta,et al. Secured power aware virtual node routing scheme for ad-hoc networks , 2013 .
[28] J. Ludden,et al. Principles and Practice , 1998, Community-based Learning and Social Movements.
[29] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.
[30] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .