SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks
暂无分享,去创建一个
[1] Angad Singh,et al. Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network , 2012 .
[2] Pritee Parwekar,et al. Security Issues and Its Counter Measures in Mobile Ad Hoc Networks , 2014 .
[3] Yang Lu,et al. Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .
[4] R Sakthivel,et al. A Grid Connected Flicker Compensation of DFIG for Power Quality Improvement by using ANN , 2015 .
[5] Chenyang Lu,et al. Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[6] Jaime Lloret Mauri,et al. Energy‐efficient multi‐level and distance‐aware clustering mechanism for WSNs , 2015, Int. J. Commun. Syst..
[7] Zhihong Liu,et al. Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Transactions on Wireless Communications.
[8] J. Godwin Ponsam,et al. A Survey on MANET Security Challenges, Attacks and its Countermeasures , 2014 .
[9] Vikaram M. Agrawal,et al. An Overview of security issues in Mobile Ad hoc Networks , 2015 .
[10] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Abdul Hanan Abdullah,et al. Efficient Cluster Head Selection Algorithm for MANET , 2013, J. Comput. Networks Commun..
[12] Pascal Lorenz,et al. A Clustering-Based Scalable Key Management Protocol for Ad Hoc Networks , 2009, 2009 Second International Conference on Communication Theory, Reliability, and Quality of Service.
[13] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[14] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[15] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[16] Jianfeng Ma,et al. Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Trans. Wirel. Commun..
[17] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[18] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[19] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[20] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[21] Poonam Sinha,et al. EFFICIENT TECHNIQUES FOR SAODV IN MOBILE ADHOC NETWORK , 2011 .
[22] Ping Yu,et al. Electronic Health Record , 2012, Encyclopedia of Gerontology and Population Aging.
[23] R. Balasubramanian,et al. Efficient Group Key Management Protocol for Region Based MANETs , 2011 .
[24] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[25] Kapil Govil,et al. Cluster head selection technique for optimization of energy conservation in MANET , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[26] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[27] Chun-Ta Li,et al. Security of Wireless Sensor Networks: Current Status and Key Issues , 2010 .
[28] Vivek Tiwari,et al. Experimental Study of Fly-ash Brick Masonry Under Subjected to Cyclic Loading , 2014 .
[29] Amjad Mehmood,et al. SALMA: An Efficient State-Based Hybrid Routing Protocol for Mobile Nodes in Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.
[30] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[31] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..