On the effect of node misbehavior in ad hoc networks
暂无分享,去创建一个
Ralf Steinmetz | Jens B. Schmitt | Matthias Hollick | Christian Seipl | R. Steinmetz | J. Schmitt | M. Hollick | Christian Seipl
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[3] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[4] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[5] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[6] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[7] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[8] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[9] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[10] Pietro Michiardi,et al. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .
[11] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[12] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[13] Ralf Steinmetz,et al. The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process , 2004, WWIC.
[14] Yuan Ning. Securing AD-HOC networks using IPSec , 2006 .