Behavior Based High Performance Protocol for MANET
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Ki-Hyung Kim,et al. Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[3] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .
[4] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[6] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[7] Maysam F. Abbod,et al. IMAN: An Intelligent MANET routing system , 2010, 2010 17th International Conference on Telecommunications.
[8] Dharma P. Agrawal,et al. Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[9] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[10] Gadadhar Sahoo,et al. A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model , 2013 .
[11] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[12] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[13] N. H. Saeed,et al. Intelligent Manet Optimisation System , 2012 .
[14] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[15] Gadadhar Sahoo,et al. Humanistic approach in mobile ad hoc network: HAMANET , 2013, ArXiv.
[16] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[17] Mario Gerla,et al. GloMoSim: A Scalable Network Simulation Environment , 2002 .
[18] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.