Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
暂无分享,去创建一个
[1] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[2] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[3] V. Bharghavan,et al. MACAW: A media access protocol for wireless LANs , 1994 .
[4] Saswati Sarkar,et al. A framework for misuse detection in ad hoc Networks-part I , 2006, IEEE Journal on Selected Areas in Communications.
[5] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[6] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Po-shan Kam. Maca - a new channel access method for packet radio , 1990 .
[11] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[12] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[13] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[14] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[15] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[16] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[17] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[18] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[19] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[20] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[21] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[22] Saswati Sarkar,et al. A framework for misuse detection in ad hoc networks- part II , 2006, IEEE Journal on Selected Areas in Communications.
[23] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[24] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[25] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[26] George Kesidis,et al. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[27] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[28] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.