Lightweight authentication-based scheme for AODV in ad-hoc networks
暂无分享,去创建一个
[1] Jalel Ben-Othman,et al. IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s , 2013, Concurr. Comput. Pract. Exp..
[2] M. K. Jayanthi,et al. Reliability Analysis of Link Stability in Secured Routing Protocols for MANETs , 2014 .
[3] Abdellah Jamali,et al. A review and a new approach to reduce routing overhead in MANETs , 2015, Wirel. Networks.
[4] A. Amara Korba,et al. Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[5] Rituparna Chaki,et al. IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).
[6] Rituparna Chaki,et al. BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.
[7] N. Kasiviswanath,et al. Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks , 2012 .
[8] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[9] Wei Sat,et al. Guidelines on Selecting Intrusion Detection Methods in MANET , 2004 .
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[11] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[13] Elisa Bertino,et al. A Collaborative Reputation System Based on Credibility Propagation in WSNs , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[14] Jalel Ben-Othman,et al. On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).
[15] Jalel Ben-Othman,et al. Performance Comparison between IBC-HWMP and Hash-HWMP , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[16] A. Rajaram,et al. An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks , 2015 .
[17] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[18] Vishnu Sharma,et al. Security issues in mobile adhoc network: A survey paper , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[19] D. O'Mahony,et al. Shared RSA key generation in a mobile ad hoc network , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[20] Rituparna Chaki. Intrusion detection: Ad-hoc networks to ambient intelligence framework , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[21] S. Sumathy,et al. Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks , 2010, ArXiv.