Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS
暂无分享,去创建一个
[1] Imrich Chlamtac,et al. A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.
[2] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[3] Ayyaswamy Kathirvel,et al. A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .
[4] Rengaramanujam Srinivasan,et al. Enchanced Self Umpiring System for Security Using Salvaging Route Reply , 2010 .
[5] Rengaramanujam Srinivasan,et al. Self _ USS : A Self Umpiring System for Security in Mobile Ad hoc Network , 2022 .
[6] Sung-Ju Lee,et al. AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[7] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[10] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[11] A. Kathirvel,et al. Global Mobile Information System Simulator in Fedora Linux , 2009 .
[12] Samir Ranjan Das,et al. Query Localization Techniques for On-Demand Routing Protocols in Ad Hoc Networks , 1999, Wirel. Networks.
[13] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Jalel Ben-Othman,et al. Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[15] Liu Dan,et al. A Novel Cryptography for Ad Hoc Network Security , 2006, 2006 International Conference on Communications, Circuits and Systems.
[16] Lei Feng-Yu,et al. Ad Hoc Networks Security Mechanism Based on CPK , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[17] Rengaramanujam Srinivasan,et al. A System of Umpires for Security of Wireless Mobile Ad Hoc Network , 2010, Int. Arab. J. e Technol..
[18] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[19] M. Hauspie,et al. Enhancing nodes cooperation in ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[20] Magdy S. El-Soudani,et al. Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[21] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[22] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[23] Mukesh Singhal,et al. Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks , 2005, MSWiM '05.
[24] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[25] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[26] Elizabeth M. Belding-Royer,et al. Dynamically Adaptive Multipath Routing based on AODV , 2004 .