Bedrohungsanalyse des IEEE 802.11s Standards für drahtlose Mesh-Netze und ausgewählte Sicherheitsmechanismen zur Bedrohungsabwehr
暂无分享,去创建一个
[1] Paul E. Hoffman,et al. Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.
[2] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[3] Celia Li,et al. SEAODV: A Security Enhanced AODV routing protocol for wireless mesh networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[4] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[5] Choong Seon Hong,et al. SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..
[6] D. Harkins,et al. Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[7] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..