Light-weight trust-based routing protocol for mobile ad hoc networks
暂无分享,去创建一个
[1] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[2] Guy Pujolle,et al. Requirements for survivable routing in MANETs , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[3] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[4] Jung-Shian Li,et al. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..
[5] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[6] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[7] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[8] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[9] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[10] Susanne Wetzel,et al. Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.
[11] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[12] Vijay Varadharajan,et al. Fellowship: Defense against Flooding and Packet Drop Attacks in MANET , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[13] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[14] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[15] Amitava Datta,et al. Incorporating trust and reputation in the DSR protocol for dependable routing , 2006, Comput. Commun..
[16] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[17] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[18] Himadri Nath Saha,et al. A Distributed Administration Based Approach for Detecting and Preventing Attacks on Mobile Ad Hoc Networks , 2011 .
[19] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[20] Milena Radenkovic,et al. Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).