Hardware assisted misbehaving nodes detection in mobile ad hoc networks
暂无分享,去创建一个
[1] Sirisha Medidi,et al. Distinguishing congestion from malicious behavior in mobile ad-hoc networks , 2004, SPIE Defense + Commercial Sensing.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[4] Rajendra V. Boppana,et al. A comparison of TCP performance over three routing protocols for mobile ad hoc networks , 2001, MobiHoc.
[5] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[6] Srivaths Ravi,et al. Embedding security in wireless embedded systems , 2003, 16th International Conference on VLSI Design, 2003. Proceedings..
[7] Charles E. Perkins,et al. Mobile Networking Through Mobile IP , 1998, IEEE Internet Comput..
[8] Nitin H. Vaidya,et al. Analysis of TCP Performance over Mobile Ad Hoc Networks , 1999, Wirel. Networks.
[9] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[10] Walid Dabbous,et al. On TCP performance in a heterogeneous network: a survey , 2000, IEEE Commun. Mag..
[11] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[12] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[13] George Kesidis,et al. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[14] Petri Mähönen,et al. TCP performance issues over wireless links , 2001, IEEE Commun. Mag..
[15] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[16] José G. Delgado-Frias,et al. Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks , 2007, 2007 15th IEEE International Conference on Networks.
[17] M. Jiang,et al. Cluster based routing protocol (CBRP) , 1999 .
[18] C C. Chiang,et al. Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .
[19] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[20] Jean C. Walrand,et al. High-performance communication networks , 1999 .
[21] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[22] J. J. Garcia-Luna-Aceves,et al. An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..
[23] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[24] Sirisha Medidi,et al. Detecting packet-dropping faults in mobile ad-hoc networks , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[25] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[26] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[27] Xin Yu,et al. Improving TCP performance over mobile ad hoc networks by exploiting cross-layer information awareness , 2004, MobiCom '04.
[28] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[29] Jin Ding,et al. Communication protocols for wireless ad-hoc and sensor networks , 2006 .
[30] Sirisha Medidi,et al. Detecting Packet Mishandling in MANETs , 2004, Security and Management.
[31] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[32] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[33] Sirisha Medidi,et al. Malicious node detection in ad-hoc wireless networks , 2003, SPIE Defense + Commercial Sensing.
[34] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[35] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[36] Shyhtsun Felix Wu,et al. Malicious packet dropping: how it might impact the TCP performance and how we can detect it , 2000, Proceedings 2000 International Conference on Network Protocols.
[37] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[38] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[39] Zeng Ying. Intrusion Detection in Wireless Ad Hoc Network , 2005 .
[40] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[41] Dave Maltz,et al. Flow State in the Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2001 .
[42] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.