Trust-Based Routing Mechanism in MANET: Design and Implementation
暂无分享,去创建一个
Shukor Abd Razak | Rashid Hafeez Khokhar | Normalia Samian | Tameem Eissa | S. Razak | R. Khokhar | T. Eissa | Normalia Samian
[1] Yuan Ning. Securing AD-HOC networks using IPSec , 2006 .
[2] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[3] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[4] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[6] J Goebel,et al. Stimulating Cooperation in Mobile Ad Hoc Networks , 2009 .
[7] Loay Abusalah,et al. TARP: trust-aware routing protocol , 2006, IWCMC '06.
[8] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[9] Hiroshi Fujinoki,et al. Study of MANET routing protocols by GloMoSim simulator , 2005 .
[10] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[11] A. Yasinsac,et al. Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..
[12] Jeong Hyun Yi,et al. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.
[13] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[14] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[15] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[17] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[18] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[19] Mukesh Singhal,et al. A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[20] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[21] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[22] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[23] Shukor Abd Razak,et al. Towards Identifying Features of Trust in Mobile Ad Hoc Network , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).
[24] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[25] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[26] Todd R. Andel,et al. Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.
[27] Minyi Guo,et al. An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[28] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[29] Shouhuai Xu,et al. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[30] Yuguang Fang,et al. A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.
[31] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[32] S. Carter. Secure Position Aided Ad Hoc Routing , 2003 .
[33] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[34] Levente Buttyán,et al. Towards provable security for ad hoc routing protocols , 2004, SASN '04.
[35] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[36] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[37] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[38] Jeong Hyun Yi,et al. Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.
[39] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.