A Local Intrusion Detection Routing Security over
暂无分享,去创建一个
[1] Mario Gerla,et al. GloMoSim: A Scalable Network Simulation Environment , 2002 .
[2] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[3] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[4] Bharat Bhargava,et al. On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[5] Rajendra V. Boppana,et al. Integrated prevention and detection of byzantine attacks in mobile ad hoc networks , 2009 .
[6] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[9] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[10] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[11] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[12] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[13] Lang Tong,et al. Timing-based localization of in-band wormhole tunnels in MANETs , 2010, WiSec '10.