Cluster-based secure communication mechanism in wireless ad hoc networks
暂无分享,去创建一个
[1] Wenke Lee,et al. Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.
[2] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[3] K. Duraiswamy,et al. Key Management and Distribution for Authenticating Group Communication , 2006, First International Conference on Industrial and Information Systems.
[4] Dharma P. Agrawal,et al. Introduction to Wireless and Mobile Systems , 2002 .
[5] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[6] Hua-Yi Lin,et al. Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme , 2006, Journal of Computer Science and Technology.
[7] M. Bansal,et al. Mobile Ad hoc Networking ( MANET ) : Routing Protocol Performance Issues and Evaluation Considerations , 2010 .
[8] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[9] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[10] Chin-Chen Chang,et al. DH-based communication method for cluster-based ad hoc networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.
[11] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[12] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[13] Yung-Fa Huang,et al. Hierarchy-based key management for secure group communications in mobile ad hoc networks , 2007, IWCMC.
[14] Meng-Yen Hsieh,et al. Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .