Performance Comparison between IBC-HWMP and Hash-HWMP
暂无分享,去创建一个
[1] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[2] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[3] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[4] Phung Huu Phu,et al. Securing AODV Routing Protocol in Mobile Ad-Hoc Networks , 2009, IWAN.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Choong Seon Hong,et al. SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Guangsong Li. An Identity-Based Security Architecture for Wireless Mesh Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[9] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[11] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[12] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[13] Jalel Ben-Othman,et al. On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).
[14] Alfred Menezes,et al. Elliptic Curves and Cryptography , 1999 .
[15] Futai Zou,et al. A Survey on Security in Wireless Mesh Networks , 2010 .
[16] Celia Li,et al. Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..