Performance analysis of black hole attacks in geographical routing MANET
暂无分享,去创建一个
[1] Imrich Chlamtac,et al. A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[4] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[5] Martin Mauve,et al. A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[8] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[9] Bart Preneel,et al. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[10] András Varga,et al. An overview of the OMNeT++ simulation environment , 2008, SimuTools.
[11] Sándor Molnár,et al. Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops , 2008, Simutools 2008.
[12] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[13] Antonio Liotta,et al. Analysis of Pervasive Mobile Ad Hoc Routing Protocols , 2010, Pervasive Computing, Innovations in Intelligent Multimedia and Applications.
[14] Gene Tsudik,et al. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.
[15] Haiying Shen,et al. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, IEEE Transactions on Mobile Computing.
[16] Ramanpreet Kaur,et al. Modeling and simulation of DDoS attack using Omnet++ , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).