A local intrusion detection routing security over MANET network
暂无分享,去创建一个
[1] Peter Martini,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[2] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[3] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[4] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[5] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .
[6] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[7] Rajendra V. Boppana,et al. Integrated prevention and detection of byzantine attacks in mobile ad hoc networks , 2009 .
[8] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[9] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[10] Lang Tong,et al. Timing-based localization of in-band wormhole tunnels in MANETs , 2010, WiSec '10.
[11] S. Muknahallipatna,et al. Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .
[12] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[13] Bharat Bhargava,et al. On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[14] Mario Gerla,et al. GloMoSim: A Scalable Network Simulation Environment , 2002 .
[15] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[16] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.