An accurate and precise malicious node exclusion mechanism for ad hoc networks
暂无分享,去创建一个
Otto Carlos Muniz Bandeira Duarte | Pedro B. Velloso | Lyno Henrique G. Ferraz | O. Duarte | P. B. Velloso
[1] Leonard Kleinrock,et al. PLASMA: A new routing paradigm for wireless multihop networks , 2012, 2012 Proceedings IEEE INFOCOM.
[2] Nei Kato,et al. A Study on Certificate Revocation in Mobile Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[3] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[4] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[5] Qian Zhang,et al. COFFEE: A Context-Free Protocol for Stimulating Data Forwarding in Wireless Ad Hoc Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[6] Otto Carlos Muniz Bandeira Duarte,et al. An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks , 2009, IEEE INFOCOM 2009.
[7] Patrick Th. Eugster,et al. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[8] Muthucumaru Maheswaran,et al. A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[9] Wolfgang Kellerer,et al. Castor: Scalable Secure Routing for Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Sajal K. Das,et al. Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.
[11] Kefei Chen,et al. Self-generated-certificate public key encryption without pairing and its application , 2011, Inf. Sci..
[12] David Johnson,et al. Comparison of two routing metrics in OLSR on a grid based mesh network , 2009, Ad Hoc Networks.
[13] Hassan Artail,et al. A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.
[14] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[15] Shouhuai Xu,et al. LHAP: A lightweight network access control protocol for ad hoc networks , 2006, Ad Hoc Networks.
[16] Pekka Nikander,et al. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.
[17] Antonio Capone,et al. A framework for detecting selfish misbehavior in wireless mesh community networks , 2009, Q2SWinet '09.
[18] Peng Ning,et al. MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks , 2012, Ad Hoc Networks.
[19] Otto Carlos Muniz Bandeira Duarte,et al. A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[20] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.