Security Management for Mobile Ad Hoc Network of Networks (MANoN)
暂无分享,去创建一个
[1] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[2] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[3] Stephen Hayes. A standard for the OAM&P of PCS systems. , 1994, IEEE Personal Communications.
[4] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[5] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] Lixia Zhang,et al. Adaptive shared tree multicast in mobile wireless networks , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).
[7] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[8] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[9] Raouf Boutaba,et al. Projecting FCAPS to Active Networks , 2001, 2001 Enterprise Networking, Applications and Services Conference Proceedings.. EntNet@SUPERCOMM2001 (Cat. No.01EX543).
[10] Mohan S. Kankanhalli,et al. Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.
[11] Tracy Camp,et al. MANET simulation studies: the incredibles , 2005, MOCO.
[12] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[13] Yvo Desmedt,et al. Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.
[14] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[15] Jorma T. Virtamo,et al. Random waypoint model in n-dimensional space , 2005, Oper. Res. Lett..
[16] Marco Mamei,et al. Applying Commonsense Reasoning to Place Identification , 2010, Int. J. Handheld Comput. Res..
[17] Jeong Hyun Yi,et al. On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Hussein Zedan,et al. Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.
[20] Mohamed G. Gouda,et al. Certificate dispersal in ad-hoc networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[21] Larry B. Stotts,et al. Manet gateways: radio interoperability via the internet, not the radio , 2008, IEEE Communications Magazine.
[22] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[23] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[24] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Amitabh Mishra,et al. Security in wireless ad hoc networks , 2003 .
[26] Yanghee Choi,et al. RODA: a new dynamic routing protocol using dual paths to support asymmetric links in mobile ad hoc networks , 2000, Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440).
[27] Lifei Huang,et al. On the scalability of IEEE 802.11 ad hoc networks , 2002, MobiHoc '02.
[28] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[29] Klas Fokine. Key Management in Ad Hoc Networks , 2002 .
[30] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[32] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[33] Hussein Zedan,et al. Refining Interval Temporal Logic Specifications , 1997, ARTS.
[34] Laurence B. Milstein,et al. On Uplink Channel Estimation in WiMAX Systems , 2010, Int. J. Mob. Comput. Multim. Commun..
[35] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[36] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[37] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[38] Suresh Singh,et al. Power efficient MAC protocol for multihop radio networks , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).
[39] George C. Hadjichristofi,et al. A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[40] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[41] David Taniar,et al. International Journal of Mobile Computing and Multimedia Communications , 2010 .
[42] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[43] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[44] H. Zheng,et al. Policy-based security management for ad hoc wireless systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[45] Wen-Guey Tzeng,et al. A Secure Fault-Tolerant Conference-Key Agreement Protocol , 2002, IEEE Trans. Computers.
[46] David Taniar. Encyclopedia of Mobile Computing and Commerce , 2007 .
[47] William Stallings,et al. Cryptography and network security , 1998 .
[48] Azzedine Boukerche,et al. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.
[49] Ricardo Staciarini Puttini,et al. A fully distributed IDS for MANET , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[50] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[51] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[52] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[53] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[54] Raghupathy Sivakumar,et al. Performance comparison of cellular and multi-hop wireless networks: a quantitative study , 2001, SIGMETRICS '01.
[55] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[56] Yang Xiao,et al. Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..
[57] Fei Xing,et al. Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[58] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[59] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[60] J.D. Smith,et al. Attributes of Effective Configuration Management For Systems of Systems , 2008, 2008 2nd Annual IEEE Systems Conference.
[61] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[62] Bruce Tuch,et al. Development of WaveLAN®, an ISM band wireless LAN , 1993, AT&T Technical Journal.
[63] Praphul Chandra. BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .
[64] Partha Dasgupta,et al. Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[65] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[66] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly , 2008, IEEE Security & Privacy.
[67] Mario Gerla,et al. TCP performance in wireless multi-hop networks , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[68] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[69] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[70] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[71] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[72] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[73] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[74] Seong Keun Oh,et al. Cognitive Ad-hoc Networks under a Cellular Network with an Interference Temperature Limit , 2008, 2008 10th International Conference on Advanced Communication Technology.
[75] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[76] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[77] Emmanuel Agu,et al. UbiWave: A Novel Energy-Efficient End-to-End Solution for Mobile 3D Graphics , 2010 .
[78] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[79] Vasos Vassiliou,et al. MARCH: a medium access control protocol for multihop wireless ad hoc networks , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[80] A. Fioretti,et al. An OSI compatible architecture for integrated multichannel metropolitan and regional networks , 1989, Proceedings. Electrotechnical Conference Integrating Research, Industry and Education in Energy and Communication Engineering',.
[81] Norman M. Abramson,et al. Development of the ALOHANET , 1985, IEEE Trans. Inf. Theory.
[82] Wen-Chen Hu,et al. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies , 2010 .
[83] Srdjan Capkun,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[84] Yu-Fang Chung,et al. Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[85] Linda Doyle,et al. Ad hoc key management infrastructure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[86] Arun Prakash,et al. Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission , 2010, Int. J. Mob. Comput. Multim. Commun..
[87] Liviu Iftode,et al. Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[88] Chunming Qiao,et al. Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..
[89] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[90] N. Raghavendra Rao. Mobile Computing - An Enabler in International Financial Services , 2006 .
[91] Nitin H. Vaidya,et al. Impact of routing and link layers on TCP performance in mobile ad hoc networks , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[92] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[93] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[94] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[95] Chai-Keong Toh. Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001 .
[96] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.