New trust based security approach for ad-hoc networks
暂无分享,去创建一个
[1] N. Bhalaji,et al. Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks , 2009 .
[2] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[3] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[4] Li Zhao,et al. MARS: Misbehavior Detection in Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[5] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[6] Evangelos Kranakis,et al. Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.
[7] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[8] Marc Branchaud,et al. xTrust: A Scalable Trust Management Infrastructure , 2004, PST.
[9] Loay Abusalah,et al. TARP: trust-aware routing protocol , 2006, IWCMC '06.
[10] Prahlad Kilambi,et al. SAFAR: An Adaptive Bandwidth-Efficient Routing Protocol for Mobile Ad Hoc Networks , 2003, ADHOC-NOW.
[11] Futai Zou,et al. A Survey on Security in Wireless Mesh Networks , 2010 .
[12] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[13] Karl N. Levitt,et al. Distributed intrusion detection models for mobile ad hoc networks , 2006 .
[14] Ernesto Jiménez Caballero. Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .