HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Ming-Yang Su,et al. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..
[2] Gurpreet Singh Bhamra,et al. Ant colony algorithms in MANETs: A review , 2012, J. Netw. Comput. Appl..
[3] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[4] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[5] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[6] Davide Cerri,et al. Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.
[7] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[8] Christos Douligeris,et al. Authentication in a layered security approach for mobile ad hoc networks , 2007, Comput. Secur..
[9] Gaurav Sharma,et al. A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .
[10] Huapeng Wu,et al. A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[11] Thorsten Holz,et al. SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines , 2012, DIMVA.
[12] Issa M. Khalil,et al. CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks , 2012, Comput. Networks.
[13] Wei Chen,et al. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007 .
[14] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[15] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[16] Kwangjo Kim,et al. Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..
[17] N. Bhalaji,et al. Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks , 2012 .
[18] Hassan Artail,et al. A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[19] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[20] Gautam M. Borkar,et al. A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks , 2017, Wirel. Networks.
[21] Jung-Shian Li,et al. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..
[22] Sourav Mukhopadhyay,et al. Computationally secure self-healing key distribution with revocation in wireless ad hoc networks , 2010, Ad Hoc Networks.
[23] Dimitris Vergados,et al. Layered security design for mobile ad hoc networks , 2006, Comput. Secur..
[24] Gene Tsudik,et al. SRDP: Secure route discovery for dynamic source routing in MANETs , 2009, Ad Hoc Networks.
[25] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[26] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[27] Eleftheria Makri,et al. Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..
[28] Lazaros F. Merakos,et al. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.
[29] Panayiotis Kotzanikolaou,et al. SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.
[30] Susanne Wetzel,et al. Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.
[31] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[32] Abdelkamel Tari,et al. Secure and reliable certificate chains recovery protocol for mobile ad hoc networks , 2016, J. Netw. Comput. Appl..
[33] J. Eberspacher,et al. Hop distances in homogeneous ad hoc networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[34] K. M. S. Soyjaudah,et al. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..